Publication: Polynomial Approach in a Secret Image Sharing Using Quadratic Residue
| dc.authorscopusid | 25652521200 | |
| dc.authorscopusid | 23051872500 | |
| dc.authorscopusid | 24725912800 | |
| dc.contributor.author | Ulutaş, G. | |
| dc.contributor.author | Nabiyev, V.V. | |
| dc.contributor.author | Ulutas, M. | |
| dc.date.accessioned | 2020-06-21T15:07:23Z | |
| dc.date.available | 2020-06-21T15:07:23Z | |
| dc.date.issued | 2009 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Ulutaş] Güzin, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Nabiyev] Vasif V., Department of Computer Engineering, Karadeniz Technical University, Trabzon, Trabzon, Turkey; [Ulutas] M., Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey | en_US |
| dc.description | Middle East Technical University and IEEE, Turkish Section | en_US |
| dc.description.abstract | Secret Image Sharing is a technique to share the secret among n participants. Each participant has meaningless, noise like shares. The secret image is revealed if any k of the shares are gathered. This scheme uses polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2007, Chen et al. proposed a new secret image sharing method that uses quadratic residues. Their scheme restricts the value of k, only (2, 2) scheme is realized with their algorithm. This prevents use of their method for any values of (k, n). In this work, we applied Shamir's polynomial approach with quadratic residues to generalize Chen's method. Proposed method is valid for any values of (k, n) as can be seen in the experimental results. Two methods (both lossy and lossless) are implemented, and their results are compared with respect to shares' size. As a result, lossless method is preferable for k values larger than two. Otherwise, lossy method is recommended. © 2009 IEEE. | en_US |
| dc.identifier.doi | 10.1109/ISCIS.2009.5291886 | |
| dc.identifier.endpage | 591 | en_US |
| dc.identifier.isbn | 9781424450237 | |
| dc.identifier.scopus | 2-s2.0-73949091837 | |
| dc.identifier.startpage | 586 | en_US |
| dc.identifier.uri | https://doi.org/10.1109/ISCIS.2009.5291886 | |
| dc.identifier.wos | WOS:000275024200103 | |
| dc.language.iso | en | en_US |
| dc.publisher | IEEE | en_US |
| dc.relation.ispartof | -- 2009 24th International Symposium on Computer and Information Sciences, ISCIS 2009 | en_US |
| dc.relation.journal | 2009 24Th International Symposium on Computer and Information Sciences | en_US |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Quadratic Residue | en_US |
| dc.subject | Secret Sharing | en_US |
| dc.title | Polynomial Approach in a Secret Image Sharing Using Quadratic Residue | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
