MK Sardar, A Adhikari - Signal Processing: Image Communication, 2020 - Elsevier
In the literature of secret sharing, the property of essential secret sharing scheme ensures that no set of participants, missing at least one essential participant, should be able to get …
With an advancement in biomedical applications, many images are communicated over the public networks. Therefore, these medical images are prone to various security threats …
The transition of visual secret sharing from a black & white secret image to a color image is not straight-forward. There are several models of color superposition principle. In this paper …
SK Sahoo, A Adhikari, S Dutta - Computers and Electrical Engineering, 2022 - Elsevier
Abstract Chinese Remainder Theorem based secret image sharing schemes provide an efficient way to store secret image files securely in a distributed manner. Two basic …
The research on color Visual Cryptographic Scheme (VCS) is much more difficult than that of the black and white VCS. This is essentially because of the fact that in color VCS, the rule for …
MK Sardar, A Adhikari - … of International Conference on Frontiers in …, 2021 - Springer
The current paper offers a lossless (k, n)-threshold scheme with reduced shadow size using the algebraic properties of the polynomial ring Z _ 251 x Z 251 x over the field Z _ 251 Z 251 …
P Kanakkath, S Madathil, R Krishnan - Multimedia Tools and Applications, 2019 - Springer
Abstract In Visual Cryptographic Scheme (VCS) shares of the secret image look like random, whereas in Extended Visual Cryptographic Scheme (EVCS) the shares look like meaningful …
S Dutta, A Adhikari - Multimedia Tools and Applications, 2023 - Springer
In the modern digital era, long-term protection of digital data, stored in a server, is essential, especially when it is in the format of medical images like electronic health records, MRI …
S Dutta, PS Roy, A Adhikari, K Sakurai - International Workshop on Digital …, 2016 - Springer
In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without …