Tuesday, 18 June 2019

An Image Secret Sharing Method Based on Shamir Secret Sharing(CTCSA)-Lupinepublishers

An Image Secret Sharing Method Based on Shamir Secret Sharing by Selda Calkavur(CTCSA)-Lupinepublishers
The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image.


For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/

No comments:

Post a Comment

Wishing you a Magical and Blissful Holiday

 Take a leap of faith and begin this wondrous new year by believing. Happy New Year!