An efficient multi-secret image sharing system based on Chinese remainder theorem and its FPGA realization

BK Sharobim, MA Fetteha, SK Abd-El-Hafiz… - IEEE …, 2023 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images
are shared in an unintelligible form to different participants, where the images can only be …

Novel encryption method for color images based on cross-channel substitution and permutation using an improved two-dimensional Henon map (2D IHM)

AJ Vithayathil, A Sreekumar - Nonlinear Dynamics, 2024 - Springer
This paper introduces symmetric chaos-based image encryption, incorporating innovative
cross-channel substitution permutation techniques using an improved Henon map. Initially …

Secret image sharing in the encrypted domain

R Wang, G Yang, X Yan, S Luo, Q Han - Journal of Visual Communication …, 2024 - Elsevier
Nowadays, digital images have a greatly widespread and profound influence on human life,
and its security protection problem is increasingly prominent. Image encryption is one of the …

A -Secret Image Sharing With Steganography Using Generalized Tent Map

BK Sharobim, SK Abd-El-Hafiz… - … on Modern Circuits …, 2024 - ieeexplore.ieee.org
Secret Image Sharing (SIS) transfers an image to mutually suspicious receivers as n
meaningless shares, where k or more shares must be present to recover the secret. This …

Double Visual Cryptography Using Generalized Tent Map, Rotation, and Image Filtering

BK Sharobim, SK Abd-El-Hafiz… - … on Engineering and …, 2023 - ieeexplore.ieee.org
This paper introduces a Multi-Visual Cryptography (MVC) system for sharing two color
images, where the secrets can be revealed with low computation power using all the shares …

Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System

BK Sharobim, SK Abd-El-Hafiz… - 2023 12th International …, 2023 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) systems share multiple images to multiple participants in
unintelligible forms that can be recovered using all the shares. This paper employs the …