Multi secret sharing with unexpanded meaningful shares

S Shivani - Multimedia Tools and Applications, 2018 - Springer
Abstract Traditional Visual Cryptography (VC) facilitates a technique to protect only one
secret image using single set of shares. Recent researches enhance the capabilities of …

[HTML][HTML] A new visual multi-secrets sharing scheme by random grids

JJY Chang, BY Huang, JST Juan - Cryptography, 2018 - mdpi.com
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS
schemes, secret information can be decoded directly through only two shares by using a …

[PDF][PDF] Visual cryptography: a review

D Vaya, S Khandelwal, T Hadpawat - International Journal of …, 2017 - academia.edu
In today's world handling and security of information from attacks becomes very important
aspect for the individuals. Researchers are innovating new techniques to secure the …

Meaningful shares based single secret sharing scheme using Chinese remainder theorem and XOR operation

AS Rawat, M Deshmukh… - 2023 10th International …, 2023 - ieeexplore.ieee.org
Secret-sharing techniques have become increasingly sophisticated over the years and now
focus on generating random shares. These shares do not provide an attacker with any …

Progressive and multi-level secret image sharing scheme with hierarchical shadows

X Wang, D Xie, F Chen, B Wu, Y Zen - Multimedia Tools and Applications, 2022 - Springer
Multi-level secret image sharing is a scheme combining hierarchical shadows with
progressive reconstruction. But in previous schemes, the generated shadows are divided …

Boolean-based multi secret sharing scheme using meaningful shares

VJ Kapadiya, LS Desai… - … Conference on Inventive …, 2018 - ieeexplore.ieee.org
Conventional visual secret sharing (VSS) scheme encodes a secret image into noise-like
images, called as meaningless shares. Sharing capacity of VSS schemes is increased by …

PHISS: Progressive and hierarchical image segmentation-sharing scheme

X Wang, D Xie, F Chen, H Zhu, T Wang - Digital Signal Processing, 2022 - Elsevier
As a classical secret sharing technique,(k, n) threshold secret image sharing mainly contains
the shadow generation phase and the image reconstruction phase. The sensitive secret …

[PDF][PDF] Advanced fault-tolerant visual multi-secret sharing scheme

JST Juan, JY Lin, BY Huang, YC Chung - J. Surveill. Secur. Saf, 2022 - f.oaes.cc
Aim: In visual cryptography, a secret image is encrypted into two meaningless random
images called shares. These two shares can be stacked to recover the secret image without …

Information hiding techniques for cryptography and steganography

Bhawna, S Kumar, V Singh - … : Proceedings of ICMDE 2020, Volume 2, 2020 - Springer
Cyber-attack is a category of attack that uses malicious code for intentionally altering the
computer data, exploiting computer systems and networks, which might result in disruptive …

Visual Cryptography: An Emerging Technology

G Kothekar, P Khatri, G Surange - International Conference on …, 2022 - Springer
In the present era, the data has become the most important asset for an individual,
community and organization. Data handling and protection from attacks has become a key …