Learn More
Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own. Secret sharing has been an active research field for many years(More)
A 2-out-of-2 audio cr yptogr aphy is a secret shar ing scheme that can be used to hide a digital message into 2 sounds and human ear s can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) Audio Cr yptogr aphy Scheme is proposed. The proposed scheme hides a digital secret message into two specified cadence. The or(More)
— There are some application areas where increasing concerns over personal information in computer system has increased interest in computer security. Increasing access to the internet and information resources has a great impact in our everyday life and in making people more dependent on computer systems and networks. This dependency has brought many(More)
Verifiable Secret Sharing Schemes (VSSS) allow the participants to verify their shares as consistent. Verifiable Secret Sharing provides the verifiability of the received shares to the participants. Most of these schemes require additional computation in the form of certificate vectors or error correction codes. This paper presents a threshold verifiable(More)
The liver is a vital organ in human body, and Liver Tumor is considered to be a fatal disease. The tumors which can occur in Liver are cancerous or non-cancerous. For diagnosis of tumor, detection and demarcation of tumor is the initial step to be performed. After detection of the tumor, its type can be determined by using technique like biopsy, which is an(More)
Threshold schemes are ideally suited to situations where a group of mutually suspicious individuals with conflicting interests must cooperate. The schemes allow a user to divide portions of a secret among a participants group. Any t or more participants from a participants group of n members can cooperate to regain the original secret while (t-1) or fewer(More)
Visual Cryptography is a technique in which a secret is encrypted into several image shares and then decrypted later using a human visual system to stack all the share images. Conventional visual cryptography methods divide a secret image into n shares (shadows) and distribute these shares to n participants. But in network while transmission the shadows can(More)