Secret sharing schemes are mainly used in cryptography with the purpose of keeping the secret safe. (k, n) threshold secret image sharing technique involves the distribution of secret image among n participants that is called shadow images that satisfy the following conditions:
(a) The complete image information will not be received when less than k shadow images.
(b) Again construct the complete image any k or more than k shadow images are required.
This scheme is mainly used in applications where single trusted entity is not available. Secret image sharing schemes have been applied to the military, e-commerce and communication fields. In this paper we propose (k, m) secret image sharing scheme with cheater detection using RSA cryptosystem.
Article Details
Unique Paper ID: 151283
Publication Volume & Issue: Volume 7, Issue 12
Page(s): 390 - 395
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT