Huang et al., 2020 - Google Patents
Flexible meaningful visual multi-secret sharing scheme by random gridsHuang et al., 2020
- Document ID
- 15216973906451434583
- Author
- Huang B
- Juan J
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
With rapid developments in network technology, information security is becoming increasingly crucial. To ensure that secret images are not being stolen during transmission, a good countermeasure is to encrypt them before transmission. Visual secret sharing (VSS) …
- 230000000007 visual effect 0 title abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pourjabbar Kari et al. | A new image encryption scheme based on hybrid chaotic maps | |
Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
CN113538203B (en) | Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256 | |
Huang et al. | Flexible meaningful visual multi-secret sharing scheme by random grids | |
Zhang et al. | A plaintext-related image encryption algorithm based on chaos | |
Deb et al. | Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR | |
Mansoor et al. | HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing | |
Singh et al. | Level by level image compression-encryption algorithm based on quantum chaos map | |
Hamza et al. | A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map | |
Chen et al. | An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing | |
Wu et al. | Generalized random grid and its applications in visual cryptography | |
Zhang | The image encryption algorithm with plaintext-related shuffling | |
Ghebleh et al. | A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation | |
Sharma | Image encryption based on a new 2D logistic adjusted logistic map | |
Yan et al. | Progressive visual secret sharing for general access structure with multiple decryptions | |
Chao et al. | XOR-based progressive visual secret sharing using generalized random grids | |
Hadj Brahim et al. | An image encryption scheme based on a modified AES algorithm by using a variable S-box | |
Naskar et al. | An audio encryption based on distinct key blocks along with PWLCM and ECA | |
Ding et al. | 2D arcsine and sine combined logistic map for image encryption | |
Yadav et al. | Essential secret image sharing approach with same size of meaningful shares | |
Nkandeu et al. | Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps | |
Al-Hyari et al. | Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture | |
Li et al. | Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift | |
Liu et al. | Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers | |
Sun et al. | A secure image encryption based on spatial surface chaotic system and AES algorithm |