A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Verifiable Essential Secret Image Sharing with Multiple Decryptions
2019
International journal of recent technology and engineering
We know that the essential secret image sharing (ESIS) scheme differs from traditional visual secret sharing with respect to the essentiality of the shares. In ESIS, to reconstruct the secret image, threshold number of the shares are required which includes all the essential shares. All the shares are very sensitive because it carries the secret information. Hence, reliability and authenticity of the shares before the decoding of the secret image are required which prevents a participant from
doi:10.35940/ijrte.b2424.078219
fatcat:pzwtx4d5dfdc3pggmmikjxe42i