1. Image Division Using Threshold Schemes with Privileges.
- Author
-
Ogiela, Marek R. and Ogiela, Lidia
- Subjects
COMPUTER passwords ,INFORMATION sharing ,THRESHOLD (Perception) - Abstract
Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditional techniques for partitioning secret information generate equal shares, i.e., each share has the same value when reconstructing the original secret. However, it turns out that it is possible to develop and use partitioning protocols that allow the generation of privileged shares, i.e., those that allow the reconstruction of secret data in even smaller numbers. This paper will therefore describe new information sharing protocols that create privileged shares, which will also use visual authorization codes based on subject knowledge to select privileged shares for secret restoration. For the protocols described, examples of their functioning will be presented, and their complexity and potential for use in practical applications will be determined. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF