Counting-based secret sharing technique for multimedia applications

A Gutub, N Al-Juaid, E Khan - Multimedia Tools and Applications, 2019 - Springer
Secret Sharing is required in situations where access to important resources has to be
protected by more than one person. We propose new secret-sharing scheme that works …

Security enhancement of shares generation process for multimedia counting-based secret-sharing technique

M Al-Ghamdi, M Al-Ghamdi, A Gutub - Multimedia Tools and Applications, 2019 - Springer
Secret sharing is a cryptographic tool to ensure reliable and secure access to information.
Counting-based secret sharing is a new secret sharing technique that generate the …

Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem

X Jia, D Wang, D Nie, X Luo, JZ Sun - Information sciences, 2019 - Elsevier
A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared
without considering the time dynamic nature of the security environment. In this paper, we …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

Trustworthy target key alteration helping counting-based secret sharing applicability

T AlKhodaidi, A Gutub - Arabian Journal for Science and Engineering, 2020 - Springer
Sensitive information used online has resulted in the emergence of many security systems to
be protected by secret keys. One of these security systems is the so-called secret sharing, in …

A new multi-secret images sharing scheme using Largrange's interpolation

JB Feng, HC Wu, CS Tsai, YP Chu - Journal of Systems and Software, 2005 - Elsevier
Secret sharing is to send shares of a secret to several participants, and the hidden secret
can be decrypted only by gathering the distributed shares. This paper proposes an efficient …

A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

J Kurihara, S Kiyomoto, K Fukushima… - Information Security: 11th …, 2008 - Springer
In Shamir's (k, n)-threshold secret sharing scheme (threshold scheme), a heavy
computational cost is required to make n shares and recover the secret. As a solution to this …

Image based steganography to facilitate improving counting-based secret sharing

A Gutub, M Al-Ghamdi - 3D Research, 2019 - Springer
The secret sharing scheme is a security tool that provides reliability and robustness for multi-
user authentication systems. This work focuses on improving the security and efficiency of …