Author:
K. Ms. CHITRA,VENKATESAN Dr. V. PRASANNA
Abstract
Secret Sharing (SS) scheme divides a secret image into shadow images (referred to as shares) in a way that requires the shadows in a certain privileged coalition for the secret reconstruction. However, the secret image cannot be revealed if they are not combined in a prescribed way. In this paper, the evolution of the traditional secret sharing scheme to the contemporary of secret sharing scheme has been presented based on its technology adoption. The basic comparison between the traditional secret sharing scheme and Visual cryptography is presented. The image-based share generation process has been explained in the context of pixel sharing patterns and its process. The reconstruction image is obtained by the XOR /OR Boolean operation. The threshold-based share generation schemes are explained mathematically and the comparative analysis of these schemes also presented.
Publisher
Inventive Research Organization
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Augmentation Approach for Internet of Things Enhanced Cryptographic Algorithm;2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS);2022-05-25
2. A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis;2022 IEEE 7th International conference for Convergence in Technology (I2CT);2022-04-07
3. New Approach of Steganographic Design of Speech Signals & its Application to Voice Recognitions;2022 IEEE 7th International conference for Convergence in Technology (I2CT);2022-04-07
4. Developing a novel steganography concept of audio data into audio streams;2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT);2022-01-20
5. Security and Privacy in Associated Self Controlled Cars;2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT);2022-01-20