[go: up one dir, main page]

Huang et al., 2020 - Google Patents

Flexible meaningful visual multi-secret sharing scheme by random grids

Huang et al., 2020

Document ID
15216973906451434583
Author
Huang B
Juan J
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

With rapid developments in network technology, information security is becoming increasingly crucial. To ensure that secret images are not being stolen during transmission, a good countermeasure is to encrypt them before transmission. Visual secret sharing (VSS) …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Pourjabbar Kari et al. A new image encryption scheme based on hybrid chaotic maps
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
CN113538203B (en) Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
Huang et al. Flexible meaningful visual multi-secret sharing scheme by random grids
Zhang et al. A plaintext-related image encryption algorithm based on chaos
Deb et al. Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
Mansoor et al. HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing
Singh et al. Level by level image compression-encryption algorithm based on quantum chaos map
Hamza et al. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
Chen et al. An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing
Wu et al. Generalized random grid and its applications in visual cryptography
Zhang The image encryption algorithm with plaintext-related shuffling
Ghebleh et al. A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation
Sharma Image encryption based on a new 2D logistic adjusted logistic map
Yan et al. Progressive visual secret sharing for general access structure with multiple decryptions
Chao et al. XOR-based progressive visual secret sharing using generalized random grids
Hadj Brahim et al. An image encryption scheme based on a modified AES algorithm by using a variable S-box
Naskar et al. An audio encryption based on distinct key blocks along with PWLCM and ECA
Ding et al. 2D arcsine and sine combined logistic map for image encryption
Yadav et al. Essential secret image sharing approach with same size of meaningful shares
Nkandeu et al. Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps
Al-Hyari et al. Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture
Li et al. Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift
Liu et al. Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
Sun et al. A secure image encryption based on spatial surface chaotic system and AES algorithm