• No results found

[PDF] Top 20 Simple and Efficient Secret Sharing Schemes for Sharing Data and Image

Has 10000 "Simple and Efficient Secret Sharing Schemes for Sharing Data and Image" found on our website. Below are the top 20 most common "Simple and Efficient Secret Sharing Schemes for Sharing Data and Image".

Simple and Efficient Secret Sharing Schemes for          Sharing Data and Image

Simple and Efficient Secret Sharing Schemes for Sharing Data and Image

... private data in a secure and effective manner. The private data include personal information, sensitive information or unique identification ...The data storage may be a private information storage ... See full document

6

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

... both data encoding and ...the secret until shares are stacked together in a particular fashion and provided with the ...original secret information from an intruder or an unwanted ... See full document

7

Secret Image Sharing By Diverse Image Media

Secret Image Sharing By Diverse Image Media

... of schemes used for encryption and Cryptanalysis is the study of techniques used for deciphering a message with no knowledge of ...enciphering. Data hiding can be defined as the art and science of hiding ... See full document

5

Efficient Secret Data Sharing Using Multimedia Compression Paradigm

Efficient Secret Data Sharing Using Multimedia Compression Paradigm

... with data hiding in compressed video. different data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis, we goal ... See full document

6

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.656 – 662 RESEARCH ARTICLE An Efficient Data hiding Method Based on Adaptive Pixel Pair Matching and Image Sharing

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.656 – 662 RESEARCH ARTICLE An Efficient Data hiding Method Based on Adaptive Pixel Pair Matching and Image Sharing

... shamir’s secret share, pixel intensity of image is divided into parts, giving each participant its own unique ...the secret might be impractical, and therefore sometimes the threshold scheme is used ... See full document

7

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

... A secret kept in a single information-carrier could be easily lost or ...damaged. Secret Sharing (SS) schemes, called (k, n) threshold schemes, have been proposed since the late 1970s ... See full document

11

A novel quality assessment for visual secret sharing schemes

A novel quality assessment for visual secret sharing schemes

... the secret image should be formed by the raw feature (intensity variance) which is strongly connected and insensitive such as “the face con- tour and the head contour of the ...testing image is ... See full document

15

A Survey on Various Visual Secret Sharing Schemes with an Application

A Survey on Various Visual Secret Sharing Schemes with an Application

... of data through it. Visual secret sharing scheme promotes some level of ...visual secret sharing schemes and its performance, the Literature has been done in this ...Visual ... See full document

5

A LITERATURE SURVEY ON  COST EFFICIENT RELIABLE AND SECRET DATA SHARING SCHEME

A LITERATURE SURVEY ON COST EFFICIENT RELIABLE AND SECRET DATA SHARING SCHEME

... a secret key of a corresponding ring member is exposed to the other person means, all previously signed signatures of this member remains ...the secret key he/she cannot identify any valid signature ... See full document

6

Secret  Sharing   and  Statistical  Zero  Knowledge

Secret Sharing and Statistical Zero Knowledge

... of Efficient Secret-Sharing ...ficient secret-sharing schemes for languages that are in P but are not known to be in NC, namely Bounded-Degree Graph Isomorphism [27, 2], and ... See full document

26

An Explication of Multifarious Secret Sharing Schemes

An Explication of Multifarious Secret Sharing Schemes

... Let‟s denote Γ as being a set of subsets of P, and the subsets in Γ as being the subset of participants that should be able to compute the key. Then Γ is denoted as being the access structure and the subsets in Γ are ... See full document

5

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... visual secret image sharing technique by using Boolean operations for encryption of n secret images into n+1 shared ...multiple secret images sharing technique which uses random ... See full document

5

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

... the secret message (the original image) which can be printed on n ...original image can be gained if fewer than threshold number of k transparencies are ... See full document

5

Secret  Sharing  Schemes  Based  on  Resilient  Boolean  Maps

Secret Sharing Schemes Based on Resilient Boolean Maps

... 18. Pieprzyk, J., Zhang, X.: Ideal threshold schemes from MDS codes. In: P.J. Lee, C.H. Lim (eds.) Information Security and Cryptology - ICISC 2002, 5th International Confer- ence Seoul, Korea, November 28-29, ... See full document

16

Robust  Secret  Sharing  Schemes  Against  Local  Adversaries

Robust Secret Sharing Schemes Against Local Adversaries

... Techniques for the Lower Bound. To prove our lower bound on minimal share size in this setting, we consider very simple local adversary strategies. We suppose that a local adversary’s goal is to cause a ... See full document

30

Asymptotically  Ideal  CRT-based  Secret  Sharing  Schemes  for  Multilevel   and  Compartmented  Access  Structures

Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures

... of secret sharing schemes for multilevel and compartmented ac- cess structures attracted the researchers’ attention for quite many years [24, 13, 16, 17, 25, 3, 4, 15, ...ideal schemes, while ... See full document

27

PPHOP survey for manage the inside threat attack detection in cloud storage

PPHOP survey for manage the inside threat attack detection in cloud storage

... when data is travelled through internet or involvement of third party is there, at that time we have to ensure the security factors and provide proof of security to ...situational data integration by non ... See full document

7

A secret image sharing scheme for light images

A secret image sharing scheme for light images

... shadow image is 1/r the size of the secret image in ...original image before performing a sharing process to hide the correlations among neighboring ...a secret image O, ... See full document

5

Broadcast (and  Round)  Efficient  Verifiable  Secret  Sharing

Broadcast (and Round) Efficient Verifiable Secret Sharing

... Verifiable secret sharing (VSS) [CGMA85], where a dealer wishes to share a secret among a group of n parties, at most t of which (possibly including the dealer) may be actively malicious, is a funda- ... See full document

19

Secure cloud data storage as a service with minimum cost in cloud environment

Secure cloud data storage as a service with minimum cost in cloud environment

... combined data and share the clustering ...their data with the other users and thus the distributed clustering task1 should be done in a privacy-preserving ...own data collecting methods, suppose that ... See full document

6

Show all 10000 documents...