A key based secure threshold cryptography for secret image

被引:0
|
作者
Naskar, Prabir Kr. [1 ]
Khan, Hari Narayan [2 ]
Chaudhuri, Atal [3 ]
机构
[1] Department of Computer Science and Engineering, MCKV Institute of Engineering Liluah, Howrah-West Bengal,711204, India
[2] Department of Computer Science and Engineering, Regent Education and Research Foundation Barrackpore, Kolkata-West Bengal,700121, India
[3] Department of Computer Science and Engineering, Jadavpur University Jadavpur, Kolkata-West Bengal,700032, India
关键词
Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:68 / 81
相关论文
共 50 条
  • [1] Secret Key-Awareness Secure in Certificateless Cryptography
    Zhang, Guoyan
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY ESIAT 2011, VOL 10, PT A, 2011, 10 : 633 - 639
  • [2] ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)
    Ertaul, L
    Lu, WM
    [J]. NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 102 - 113
  • [3] Threshold Cryptography & Genetic Algorithm Based Secure Key Exchange for Mobile Hosts
    Sahoo, D.
    Rai, S. Champati
    Pradhan, S.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1297 - +
  • [4] RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication
    Retoliya, Rajkumari
    Soner, Swapnil
    Jain, Ati
    Tripathi, Anshu
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 624 - +
  • [5] Secure Random Phase Key Exchange Schemes for Image Cryptography
    Kim, Youhyun
    Sim, Minwoo
    Moon, Inkyu
    Javidi, Bahram
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10855 - 10861
  • [6] A TOOL FOR SECRET KEY CRYPTOGRAPHY
    MICHENER, JR
    [J]. DR DOBBS JOURNAL, 1988, 13 (08): : 50 - &
  • [7] Unshared Secret Key Cryptography
    Liu, Shuiyin
    Hong, Yi
    Viterbo, Emanuele
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (12) : 6670 - 6683
  • [8] Threshold cryptography based on Asmuth-Bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    [J]. INFORMATION SCIENCES, 2007, 177 (19) : 4148 - 4160
  • [9] Threshold cryptography based on asmuth-bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    Tezcan, Zahir
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 935 - +
  • [10] Implementation of Secure Key Distribution Based On Quantum Cryptography
    Elboukhari, Mohamed
    Azizi, Abdelmalek
    Azizi, Mostafa
    [J]. 2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 361 - +