A key based secure threshold cryptography for secret image

被引:0
|
作者
Naskar, Prabir Kr. [1 ]
Khan, Hari Narayan [2 ]
Chaudhuri, Atal [3 ]
机构
[1] Department of Computer Science and Engineering, MCKV Institute of Engineering Liluah, Howrah-West Bengal,711204, India
[2] Department of Computer Science and Engineering, Regent Education and Research Foundation Barrackpore, Kolkata-West Bengal,700121, India
[3] Department of Computer Science and Engineering, Jadavpur University Jadavpur, Kolkata-West Bengal,700032, India
关键词
Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:68 / 81
相关论文
共 50 条
  • [21] Cellular automata computations and secret key cryptography
    Seredynski, F
    Bouvry, P
    Zomaya, AY
    [J]. PARALLEL COMPUTING, 2004, 30 (5-6) : 753 - 766
  • [22] A secure image transmission scheme based on digital watermark and cryptography
    Wu, J
    Xia, BB
    Liu, J
    Tian, JW
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL SYMPOSIUM ON INTELLIGENT MULTIMEDIA, VIDEO AND SPEECH PROCESSING, 2004, : 278 - 281
  • [23] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [24] A Novel Cryptography Method Based on Image for Key Generation
    Barhoom, Tawfiq S.
    Abusilmiyeh, Zakaria M.
    [J]. PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2013, : 71 - 76
  • [25] An ultra robust session key based image cryptography
    Khan, Hari Narayan
    Chaudhuri, Ayan
    Das, Abhishek
    Chaudhuri, Atal
    [J]. MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2020, 26 (07): : 2193 - 2201
  • [26] An ultra robust session key based image cryptography
    Hari Narayan Khan
    Ayan Chaudhuri
    Abhishek Das
    Atal Chaudhuri
    [J]. Microsystem Technologies, 2020, 26 : 2193 - 2201
  • [27] SCHEME FOR SECURE DIGITAL MOBILE COMMUNICATIONS BASED ON SYMMETRICAL KEY CRYPTOGRAPHY
    HWANG, T
    [J]. INFORMATION PROCESSING LETTERS, 1993, 48 (01) : 35 - 37
  • [28] Secret Key Transmission Based on Channel Reciprocity for Secure IoT
    Choi, Jinho
    Ha, Jeongseok
    [J]. 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 388 - 392
  • [29] Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography
    Thammarat, Chalee
    Techapanupreeda, Chian
    [J]. 36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 46 - 51
  • [30] Secret image encryption based on chaotic system and elliptic curve cryptography
    Banik, Arpita
    Singh, Laiphrakpam Dolendro
    Agrawal, Amit
    Patgiri, Ripon
    [J]. DIGITAL SIGNAL PROCESSING, 2022, 129