Keywords = Secret Sharing
Number of Articles: 4
Text File Hiding Randomly Using Secret Sharing Scheme
Volume 36, 1B , January 2018, , Page 1-6
Abstract
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection ... Read More ...Biometric Privacy Using Secret Image Sharing
Volume 35, 7A , July 2017, , Page 701-708
Abstract
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most ... Read More ...Secret Sharing Scheme Based Technique for Authentication of Documents Images
Volume 32, 6B , June 2014, , Page 1092-1105
Abstract
Digital document image is a form of persevering important information, and, because of rapid technological development, it is easy to copy, counterfeit this digital document image and ... Read More ...Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption
Volume 28, Issue 7 , March 2010, , Page 1340-1349