A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

B Parihar, AS Rawat, M Deshmukh - The Journal of Supercomputing, 2024 - Springer
Secret sharing schemes play a vital role in securely distributing a secret among multiple
participants, ensuring confidentiality and access control. However, traditional secret sharing …

Software and hardware realizations for different designs of chaos-based secret image sharing systems

BK Sharobim, M Hosam, SK Abd-El-Hafiz… - Journal of Real-Time …, 2024 - Springer
Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by
sending meaningless shares to the participants, and all shares must be present to recover …

Pixel-based visual secret sharing using lorenz system

BK Sharobim, SK Abd-El-Hafiz, WS Sayed… - Proceedings of the …, 2023 - dl.acm.org
(n, n)-Visual Secret Sharing (VSS) allows a user to send an image in the form of shares to
different participants. Every share can not reveal the secret alone, and only all shares …

FPGA implementation of secret sharing for textured 3D mesh model based on texture vertex correlation

ZM Wu, H Kong, B Yan, JS Pan, HM Yang… - Journal of Real-Time …, 2024 - Springer
Secret sharing is an important encryption technique in the field of information security. It can
ensure the security of secret information. Textured 3D (three-dimensional) mesh model is an …

Double Visual Cryptography Using Generalized Tent Map, Rotation, and Image Filtering

BK Sharobim, SK Abd-El-Hafiz… - … on Engineering and …, 2023 - ieeexplore.ieee.org
This paper introduces a Multi-Visual Cryptography (MVC) system for sharing two color
images, where the secrets can be revealed with low computation power using all the shares …

Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System

BK Sharobim, SK Abd-El-Hafiz… - 2023 12th International …, 2023 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) systems share multiple images to multiple participants in
unintelligible forms that can be recovered using all the shares. This paper employs the …

A Study of Secret Image Sharing Schemes Using

DK Rabari, YK Meghrajani - Harnessing Quantum Cryptography …, 2024 - books.google.com
Since the beginning of time, humans have had secrets, and individuals have always been
curious to learn about them. People transmit digital data to convey secret in-formation in a …

Real-Time License Plate Positioning Algorithm Optimization and Hardware Implementation

W Zhang, W Ji - 2024 5th International Conference on …, 2024 - ieeexplore.ieee.org
Aiming at the problems of limited application environment and high consumption of
hardware resources of the number plate positioning system implemented by the traditional …