Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

QR code as an element of educational activity

Z Deineko, N Kraievska, V Lyashenko - 2022 - openarchive.nure.ua
Анотація Educational activity is one of the directions, which in its development uses various
advanced technologies. This makes it possible to increase the attractiveness of the learning …

Visual cryptography in single-pixel imaging

S Jiao, J Feng, Y Gao, T Lei, X Yuan - Optics express, 2020 - opg.optica.org
Two novel visual cryptography (VC) schemes are proposed by combining VC with single-
pixel imaging (SPI) for the first time. It is pointed out that the overlap** of visual key images …

Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

Improved visual secret sharing scheme for QR code applications

Y Cheng, Z Fu, B Yu - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Quick response (QR) codes have been widely used in applications, such as data storage
and high-speed machine reading. Anyone can gain access to the information stored in QR …

Biometric security through visual encryption for fog edge computing

W Abdul, Z Ali, S Ghouzali, B Alfawaz… - IEEE …, 2017 - ieeexplore.ieee.org
Fog and mobile edge computing have gained considerable attention from the research and
development community. The problems related to security and privacy of biometric content …

Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions

S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018 - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …

Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism

PC Huang, CC Chang, YH Li, Y Liu - Journal of Information Security and …, 2021 - Elsevier
In recent years, QR code is popular online and offline, and it is an ideal media for secret
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …

Using color QR codes for QR code secret sharing

JS Pan, T Liu, B Yan, HM Yang, SC Chu - Multimedia Tools and …, 2022 - Springer
The secret sharing scheme can share the secret image with several shares. The secure
transmission of the quick response (QR) code can be enhanced by the secret sharing …

QR-3S: A high payload QR code secret sharing system for industrial Internet of Things in 6G networks

L **ong, X Zhong, NN **ong… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The communication in a 6G-enabled network in a box (NIB) needs to meet the
characteristics of fast, convenient, and safe. Secret sharing scheme has become a hot topic …