A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography
Communications of the ACM
Efficient Sharing of Many Secrets
STACS '93 Proceedings of the 10th Annual Symposium on Theoretical Aspects of Computer Science
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Sharing one secret vs. sharing many secrets
Theoretical Computer Science - Mathematical foundations of computer science
Sharing multiple secrets in digital images
Journal of Systems and Software
Sharing multiple secrets in visual cryptography
Pattern Recognition
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
Visual secret sharing for multiple secrets
Pattern Recognition
Image encryption by multiple random grids
Pattern Recognition
Sharing visual multi-secrets using circle shares
Computer Standards & Interfaces
Efficient multi-secret image sharing based on Boolean operations
Signal Processing
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
Visual Multiple-Secret Sharing by Circle Random Grids
SIAM Journal on Imaging Sciences
Yet another multiple-image encryption by rotating random grids
Signal Processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.08 |
This study proposes a novel multi-image threshold sharing scheme based on Chinese remainder theorem and Lagrange interpolation. The exceptional property of the scheme is its ability to retrieve any secret image without recovering all the other images. Therefore, it works efficiently and reduces computation cost in case it needs to recover only one image from shares. In term of capacity, the scheme has no limitation on number of input secret images, output shares and the recovery threshold. Another advantage of the scheme is that it can be used for many image formats whether it is binary or grayscale or color. Moreover, the scheme can recover the secret images without any distortion.