Sardar et al., 2020 - Google Patents
A new lossless secret color image sharing scheme with small shadow sizeSardar et al., 2020
- Document ID
- 2786488364593126093
- Author
- Sardar M
- Adhikari A
- Publication year
- Publication venue
- Journal of Visual Communication and Image Representation
External Links
Snippet
Though there have been many research works carried out on the grayscale secret image sharing schemes, there is not sufficient research work available on the field of color secret image sharing schemes, especially on the lossless secret image sharing schemes. In the …
- 238000011084 recovery 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sardar et al. | A new lossless secret color image sharing scheme with small shadow size | |
| Demirtaş | A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos | |
| Chang et al. | Sharing a secret gray image in multiple images | |
| Elsheh et al. | Secret sharing approaches for 3D object encryption | |
| CN103226802B (en) | Based on the medical image share method of chaos encryption | |
| Paul et al. | A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2 | |
| Youmaran et al. | An improved visual cryptography scheme for secret hiding | |
| CN106997607A (en) | Image bit plane chaotic encryption method based on compressed sensing | |
| Almalkawi et al. | A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications | |
| Nag et al. | Secret image sharing scheme based on a boolean operation | |
| Hodeish et al. | An optimal (k, n) visual secret sharing scheme for information security | |
| Safdar et al. | Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security | |
| Karthikeyan et al. | A combination of RSA algorithm with image steganography to ensure enhanced encryption | |
| Srividhya et al. | Implementation of TiOISSS with meaningful shadows and with an additional authentication image | |
| Kuzmenko et al. | Modification of the scheme of division of asmuth-bloom data with the application of the method of fractal geometry | |
| Roy et al. | A novel 3–4 image secret sharing scheme | |
| Baranwal et al. | Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare | |
| Sahlabadi et al. | Using cycling 3D chaotic map and DNA sequences for introducing a novel algorithm for color image encryption | |
| Abdelsatir et al. | A novel (k, n) secret sharing scheme from quadratic residues for grayscale Images | |
| Abed | A proposed encoding and hiding text in an image by using fractal image compression | |
| Mondal et al. | A Multi-Stage Encryption Technique to Enhance the Secrecy of Image. | |
| Ajaz et al. | Hybrid security scheme for a colored image using DNA and chaotic map | |
| Gumanti et al. | Superencryption of BASE 64 Algorithm and ELGAMAL Algorithm on Android Based Image Security | |
| Parameshwaran et al. | Encryption algorithms for color images: a brief review of recent trends | |
| Chouksey et al. | Enhanced Visual Cryptography for Color Images using Error Diffusion based AES Encryption. |