A security management framework for big data in smart healthcare

P Sarosh, SA Parah, GM Bhat, K Muhammad - Big Data Research, 2021 - Elsevier
Big Data analytics in the medical sector can assist medical professionals to facilitate
improvement in healthcare. With the help of data analysis, clinical images of patients can be …

Utilization of secret sharing technology for secure communication: a state-of-the-art review

P Sarosh, SA Parah, GM Bhat - Multimedia Tools and Applications, 2021 - Springer
Cryptography is the process by which a readable message is converted into cipher-text
unintelligible to an eavesdropper. With the advent of the internet, improved network …

A survey paper on secret image sharing schemes

OB Chanu, A Neelima - International Journal of Multimedia Information …, 2019 - Springer
With the speedy progress of network technology and internet applications, protection of
digitized data against unauthorized access and modification has become a paramount …

[图书][B] Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

S Çalkavur, A Bonnecaze, R dela Cruz, P Solé - 2022 - World Scientific
The notion of secret sharing was independently introduced in 1979 by Shamir [36] and
Blakley [7]. A secret-sharing scheme (also called SSS) is a method by which one can …

Partial Encryption Scheme of Medical Images Based on DWT, Secret Image Sharing and Hyperchaotic System.

AH Alwan, AT Hashim, SA Ali - Traitement du Signal, 2024 - search.ebscohost.com
There has been a significant increase in the demand for secure image storage in healthcare
organizations in recent years. Encryption is used to address the challenge of encrypting …

[PDF][PDF] Improving contrast in random grids based visual secret sharing

S Kumar, RK Sharma - International Journal of Security and Its Applications, 2012 - iitd.ac.in
In the existing random grids based (n, n) visual secret sharing (VSS) schemes, decryption is
done with the help of human visual system by stacking the cipher grids. The stacking …

Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing

MS Sudha, TC Thanuja - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
Forgery of the digital image is to hide or to remove some meaningful or useful information of
the image. In this paper (k, n) Shamir threshold scheme is applied to an image where the …

Performance evaluation of fingerprint trait authentication system

RS Patil, SD Patil, SD Thepade - International Conference on Intelligent …, 2018 - Springer
Biometric authentication is a way of verifying the person which he claims. Biometric
authentication verifies the identity of the person by comparing the biometric trait with the …

Text image secret sharing with hiding based on color feature

NJ Ibrahim, YH Ali, A Al-barrak… - Periodicals of Engineering …, 2022 - pen.ius.edu.ba
Abstract The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold
method. Secret Sharing becomes an efficient method to ensure secure data transmission …

Secret sharing scheme for data encryption based on polynomial coefficient

MM Sathik, AK Selvi - 2010 Second International conference on …, 2010 - ieeexplore.ieee.org
In recent years, there has been increasing trend for multimedia applications to use delegate
service providers for content distributions. These delegate services have brought new …