首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images
  • 本地全文:下载
  • 作者:Sugianto Sugianto ; Suharjito Suharjito ; Nico Surantha
  • 期刊名称:TELKOMNIKA (Telecommunication Computing Electronics and Control)
  • 印刷版ISSN:2302-9293
  • 出版年度:2018
  • 卷号:16
  • 期号:1
  • 页码:323-333
  • DOI:10.12928/telkomnika.v16i1.6632
  • 语种:English
  • 出版社:Universitas Ahmad Dahlan
  • 其他摘要:The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splittin g, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three m ethods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well.
国家哲学社会科学文献中心版权所有