Text File Hiding Randomly Using Secret Sharing Scheme
Text File Hiding Randomly Using Secret Sharing Scheme

Yossra H. Ali; Hussein J. Mankhi

Volume 36, 1B , January 2018, , Page 1-6

https://doi.org/10.30684/etj.36.1B.1

Abstract
  Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection ...  Read More ...
Biometric Privacy Using Secret Image Sharing
Biometric Privacy Using Secret Image Sharing

A.T. Hashim; D.A. Noori

Volume 35, 7A , July 2017, , Page 701-708

https://doi.org/10.30684/etj.35.7A.5

Abstract
  Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most ...  Read More ...
Secret Sharing Scheme Based Technique for Authentication of Documents Images
Secret Sharing Scheme Based Technique for Authentication of Documents Images

Muna Ghazi; Hanaa M. A. Salman

Volume 32, 6B , June 2014, , Page 1092-1105

https://doi.org/10.30684/etj.32.6B.8

Abstract
  Digital document image is a form of persevering important information, and, because of rapid technological development, it is easy to copy, counterfeit this digital document image and ...  Read More ...
Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption
Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption

Musaab R. Abdulrazzaq

Volume 28, Issue 7 , March 2010, , Page 1340-1349

https://doi.org/10.30684/etj.28.7.6

Abstract
  Secret sharing is a scheme used to distribute secret among a group of users.Rather than making duplicated copies of secrets among users, the secret is dividedinto a number of pieces, ...  Read More ...