{"title":"Multiple Secret Images Sharing Scheme","authors":"V. Rishiwal, H. Kumar, K. Arya, M. Yadav","doi":"10.1109/ICIINFS.2008.4798374","DOIUrl":null,"url":null,"abstract":"Secret sharing is an efficient method of transmitting the image securely. This paper discusses an efficient secret sharing scheme for multiple secret images. It has been shown through the experimental result that the proposed scheme transmits the images secretly and then efficiently recovers the same at the receiver end. This scheme is general in nature and can be applied on any image size. The scheme comprises of the important algorithms namely share generation algorithm and combination algorithm. The share generation algorithm generates the shares of secret multiple images and the combination algorithm combines the specified shares to get the secret images within a very short time and provide high level of security.","PeriodicalId":429889,"journal":{"name":"2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIINFS.2008.4798374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Secret sharing is an efficient method of transmitting the image securely. This paper discusses an efficient secret sharing scheme for multiple secret images. It has been shown through the experimental result that the proposed scheme transmits the images secretly and then efficiently recovers the same at the receiver end. This scheme is general in nature and can be applied on any image size. The scheme comprises of the important algorithms namely share generation algorithm and combination algorithm. The share generation algorithm generates the shares of secret multiple images and the combination algorithm combines the specified shares to get the secret images within a very short time and provide high level of security.