Comparison of secret splitting, secret sharing and recursive threshold visual cryptography for security of handwritten images

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splitting, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three methods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well.

References Powered by Scopus

Phase retrieval via matrix completion

342Citations
N/AReaders
Get full text

Chinese remainder theorem-based secret image sharing for (k, n) threshold

41Citations
N/AReaders
Get full text

Generalized random grids-based threshold visual cryptography with meaningful shares

39Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A key recovery system based on password-protected secret sharing in a permissioned blockchain

21Citations
N/AReaders
Get full text

Blockchain-Based Key Management Scheme Using Rational Secret Sharing

2Citations
N/AReaders
Get full text

Adaptive CSLBP compressed image hashing

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Sugianto, Suharjito, & Surantha, N. (2018). Comparison of secret splitting, secret sharing and recursive threshold visual cryptography for security of handwritten images. Telkomnika (Telecommunication Computing Electronics and Control), 16(1), 323–333. https://doi.org/10.12928/TELKOMNIKA.v16i1.6632

Readers over time

‘18‘19‘20‘21‘22‘2300.751.52.253

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

67%

Lecturer / Post doc 2

33%

Readers' Discipline

Tooltip

Computer Science 2

40%

Social Sciences 1

20%

Engineering 1

20%

Mathematics 1

20%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free
0