(k, m) Secret Image Sharing Scheme with Cheater Detection Using RSA Cryptosystem
Author(s):
Harshita Pathak, Anjulata Yadav, Manish Panchal, Prakash Vyavahare
Keywords:
Secret image sharing, RSA cryptosystem, Cheater Detection, Encryption, Decryption
Abstract
Secret sharing schemes are mainly used in cryptography with the purpose of keeping the secret safe. (k, n) threshold secret image sharing technique involves the distribution of secret image among n participants that is called shadow images that satisfy the following conditions: (a) The complete image information will not be received when less than k shadow images. (b) Again construct the complete image any k or more than k shadow images are required. This scheme is mainly used in applications where single trusted entity is not available. Secret image sharing schemes have been applied to the military, e-commerce and communication fields. In this paper we propose (k, m) secret image sharing scheme with cheater detection using RSA cryptosystem.
Article Details
Unique Paper ID: 151283

Publication Volume & Issue: Volume 7, Issue 12

Page(s): 390 - 395
Article Preview & Download


Share This Article

Conference Alert

ICM - STEP

International conference on Management, Science, Technology, Engineering, Pharmact and Humanities.

Go To Issue



Call For Paper

Volume 7 Issue 9

Last Date 25 February 2020

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies