Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its...

Full description

Saved in:
Bibliographic Details
Main Authors: Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi
Format: Article
Language:English
Published: Wiley 2024-12-01
Series:CAAI Transactions on Intelligence Technology
Subjects:
Online Access:https://doi.org/10.1049/cit2.12357
Tags: Add Tag
No Tags, Be the first to tag this record!