An Image Secret Sharing Method Based on Shamir Secret Sharing by Selda Calkavur(CTCSA)-Lupinepublishers |
The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image.
For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/
For more Computer Science Articles Please click here: https://lupinepublishers.com/computer-science-journal/index.php
No comments:
Post a Comment