Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{151283, author = {Harshita Pathak and Anjulata Yadav and Manish Panchal and Prakash Vyavahare}, title = {(k, m) Secret Image Sharing Scheme with Cheater Detection Using RSA Cryptosystem}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {7}, number = {12}, pages = {390-395}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=151283}, abstract = {Secret sharing schemes are mainly used in cryptography with the purpose of keeping the secret safe. (k, n) threshold secret image sharing technique involves the distribution of secret image among n participants that is called shadow images that satisfy the following conditions: (a) The complete image information will not be received when less than k shadow images. (b) Again construct the complete image any k or more than k shadow images are required. This scheme is mainly used in applications where single trusted entity is not available. Secret image sharing schemes have been applied to the military, e-commerce and communication fields. In this paper we propose (k, m) secret image sharing scheme with cheater detection using RSA cryptosystem. }, keywords = {Secret image sharing, RSA cryptosystem, Cheater Detection, Encryption, Decryption}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry