A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
Abstract Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and authentication for cheating prevention....
Saved in:
| Main Authors: | Krishnaraj Bhat, Uday Kumar Reddy K.R., Ranjan Kumar H.S., Dindayal Mahto |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-01-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12001 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography
by: Duc-Thuan Dam, et al.
Published: (2024-01-01) -
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01) -
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
by: Bin LI, et al.
Published: (2022-02-01) -
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
by: Yuecheng WANG, et al.
Published: (2025-01-01) -
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01)