Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "4dcd69fc-89fb-4737-b940-58d2b5484168"}, "_deposit": {"id": "4932", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4932"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4932", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "2-out-of-3 Secret Sharing Scheme Using Visual Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the rapid advancement of networktechnology, the security of secret data is threatenedbecause anyone may tend to intrude the system oreavesdrop via the communication channel. Mostsecret sharing schemes are based on cryptographysuch that the encryption and decryption processesneed high computation costs. Visual cryptography, akind of secret sharing schemes, differs fromtraditional secret sharing in terms of the efficientdecryption process. It encrypts a secret image intoseveral shares and then it can be recovered not onlycomputer but also human visual system. This paperpresents 2-out-of-3 secret sharing method by usingbit-level decomposition which can be applied tobinary, gray-scale and color images. The secret isreconstructed by stacking the encrypted shares thesecret image becomes clearly visible. Secret image isdivided into three image shares. These shares aredistributed to each of three users. Any two or allimage shares can be stacked together to recover theoriginal image perfectly."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Visual Cryptography"}, {"interim": "2-out-of-3 secret sharing scheme"}, {"interim": "bit-level decomposition"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (119).pdf", "filesize": [{"value": "57 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 57000.0, "url": {"url": "https://meral.edu.mm/record/4932/files/psc2010paper (119).pdf"}, "version_id": "d93128bb-a197-4538-a0c6-ce754cdca374"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zaw, Hnin Thiri"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/833"}, "item_title": "2-out-of-3 Secret Sharing Scheme Using Visual Cryptography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004932", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4932", "relation": {}, "relation_version_is_last": true, "title": ["2-out-of-3 Secret Sharing Scheme Using Visual Cryptography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

2-out-of-3 Secret Sharing Scheme Using Visual Cryptography

http://hdl.handle.net/20.500.12678/0000004932
http://hdl.handle.net/20.500.12678/0000004932
eb00f89e-08dc-4ff2-b04e-c02c1ff0f0ea
4dcd69fc-89fb-4737-b940-58d2b5484168
None
Preview
Name / File License Actions
psc2010paper psc2010paper (119).pdf (57 Kb)
Publication type
Article
Upload type
Publication
Title
Title 2-out-of-3 Secret Sharing Scheme Using Visual Cryptography
Language en
Publication date 2010-12-16
Authors
Zaw, Hnin Thiri
Mya, Khin Than
Description
With the rapid advancement of networktechnology, the security of secret data is threatenedbecause anyone may tend to intrude the system oreavesdrop via the communication channel. Mostsecret sharing schemes are based on cryptographysuch that the encryption and decryption processesneed high computation costs. Visual cryptography, akind of secret sharing schemes, differs fromtraditional secret sharing in terms of the efficientdecryption process. It encrypts a secret image intoseveral shares and then it can be recovered not onlycomputer but also human visual system. This paperpresents 2-out-of-3 secret sharing method by usingbit-level decomposition which can be applied tobinary, gray-scale and color images. The secret isreconstructed by stacking the encrypted shares thesecret image becomes clearly visible. Secret image isdivided into three image shares. These shares aredistributed to each of three users. Any two or allimage shares can be stacked together to recover theoriginal image perfectly.
Keywords
Visual Cryptography, 2-out-of-3 secret sharing scheme, bit-level decomposition
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/833
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:32:06.728110
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL