Selective scalable secret image sharing with verification
Citations
245 citations
156 citations
127 citations
116 citations
96 citations
References
14,340 citations
"Selective scalable secret image sha..." refers background in this paper
...We introduce ART and Shamir’s secret sharing technique in Section 2....
[...]
...The (t, n) threshold mechanism was firstly proposed by Shamir [9] in 1979....
[...]
...In 1979, Shamir first proposed the concept of (t,n) threshold secret sharing to mitigate this problem [9]....
[...]
1,057 citations
[...]
777 citations
"Selective scalable secret image sha..." refers background in this paper
...Nevertheless, neither [10] nor [6] can provide a meaningful shadow image....
[...]
...Thien and Lin later extended this concept to protect confidential images [10]....
[...]
454 citations
"Selective scalable secret image sha..." refers background or methods in this paper
...Lin and Tsai offered a version, in which each shadow is meaningful [7]....
[...]
...To highlight the ability to mitigate the potential risk of attackers’ consciousness, we conducted simulations of related state-of-the-art works [7, 15], which are (2, 4) scalable secret image sharing methods....
[...]
...4 Shadow evaluation for the (2, 4) secret image sharing schemes: a the shadows of [15]; b the shadows of [7]; c the shadows of the proposed scheme 8 Multimed Tools Appl (2017) 76:1–11...
[...]
287 citations
"Selective scalable secret image sha..." refers background or methods in this paper
...To highlight the ability to mitigate the potential risk of attackers’ consciousness, we conducted simulations of related state-of-the-art works [7, 15], which are (2, 4) scalable secret image sharing methods....
[...]
...Yang and Huang extended SSIS to a t-out-of-n version in 2010 [11, 13, 15, 17], where a qualified group of participants includes t participants and 2≤t≤n....
[...]
...4 Shadow evaluation for the (2, 4) secret image sharing schemes: a the shadows of [15]; b the shadows of [7]; c the shadows of the proposed scheme 8 Multimed Tools Appl (2017) 76:1–11...
[...]