IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Image Processing Using Secret Sharing Schemes
Authors Name: V Krishna Kumar , D Boobala Muralitharan , S Akshay , R Akash Kumar , S Arun Kumar
Unique Id: IJSDR2207031
Published In: Volume 7 Issue 7, July-2022
Abstract: Secret Image Sharing allows a user to create the shared images from a secret image in such a way that an individual share does not reveal any information about the secret image, however when a specified number of shares are brought together, they can be used to reconstruct the secret image. Secret image sharing mechanisms have been widely applied to the military, ecommerce, and communications fields. This project aims to describe the design and development of a basic Secret Image Sharing System that is capable of efficiently generating shares and reconstructing the secret image from the shares. This system provides a framework which can be used as a powerful tool for Secret Image Sharing research. Efficient calculations of data make the framework an extremely powerful one. With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store their private images in the cloud. Secret image sharing as a significant method has been widely applied in protecting images in the cloud, which reduces the risks of data leakage and data loss. Generally, the secret image sharing scheme would encrypt the secret image into a series of shares and then stored these shares in a cloud. However, when this cloud has been attacked, the secret may meet a risk of leakage. A solution to solve the problem is that the generated shares are distributed storage in multiple clouds. Each cloud is independent and all clouds can have a collaboration to manage the secret image
Keywords: Secret image, Shamir’s Algorithm Encryption Technique, Number of Shares, Cipher text , Secret Sharing, Image Processing, AES Encryption of Images, JWT Token
Cite Article: "Image Processing Using Secret Sharing Schemes", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.7, Issue 7, page no.216 - 220, July-2022, Available :http://www.ijsdr.org/papers/IJSDR2207031.pdf
Downloads: 000337070
Publication Details: Published Paper ID: IJSDR2207031
Registration ID:200930
Published In: Volume 7 Issue 7, July-2022
DOI (Digital Object Identifier):
Page No: 216 - 220
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner