Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Real-time medical systems based on human biometric steganography: A systematic review

AH Mohsin, AA Zaidan, BB Zaidan, SA Ariffin… - Journal of medical …, 2018 - Springer
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …

Research on AI security enhanced encryption algorithm of autonomous IoT systems

B Li, Y Feng, Z **ong, W Yang, G Liu - Information sciences, 2021 - Elsevier
Aiming at the security issues during the multi-types data storage and data transmission in
autonomous Internet of Things (IoT) systems, this paper proposes an AI algorithm for data …

Gan-based key secret-sharing scheme in blockchain

W Zheng, K Wang, FY Wang - IEEE transactions on cybernetics, 2020 - ieeexplore.ieee.org
In this article, we propose a key secret-sharing technology based on generative adversarial
networks (GANs) to address three major problems in the blockchain: 1) low security; 2) hard …

Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

Image steganography using fractal cover and combined chaos-DNA based encryption

A Durafe, V Patidar - Annals of Data Science, 2024 - Springer
To address the need for secure digital image transmission an algorithm that fulfils all
prominent prerequisites of a steganography technique is developed. By incorporating the …

A survey paper on secret image sharing schemes

OB Chanu, A Neelima - International Journal of Multimedia Information …, 2019 - Springer
With the speedy progress of network technology and internet applications, protection of
digitized data against unauthorized access and modification has become a paramount …

Multiple share creation with optimal hash function for image security in wsn aid of ogwo

K Shankar, M Elhoseny, K Shankar… - … Image Transmission in …, 2019 - Springer
Visual share creation, with a security model, verifies the secret data transmitted by the
sender. It uses human vision to decrypt the encrypted images without complex algorithms for …

A secure cryptographic cloud communication using DNA cryptographic technique

S Goyat, S Jain - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
The main aim of the proposed work is to design a secure cloud storage and data distribution
platform for the open cloud (public cloud). This platform offers the secure communication …

A new diffusion and substitution based cryptosystem for securing medical image applications

L Mancy, SMC Vigila - International Journal of Electronic …, 2018 - inderscienceonline.com
Due to the rising privilege for tele-health facilities have sophisticated responsiveness in the
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …