Table of Contents
Chinese Journal of Engineering
Volume 2014, Article ID 736750, 7 pages
http://dx.doi.org/10.1155/2014/736750
Research Article

SSDLP: Sharing Secret Data between Leader and Participant

College of Badr, Department of Computer, Taibah University, Medina, Saudi Arabia

Received 30 September 2013; Accepted 7 November 2013; Published 14 January 2014

Academic Editors: Z. Shi and S. Simani

Copyright © 2014 Hazem Al-Najjar and Nadia Al-Rousan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Scopus
  2. G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the AFIPS National Computer Conference (NCC '79), vol. 48, pp. 313–317, 1979.
  3. M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—Eurocrypt, vol. 94, pp. 1–12, Springer, Berlin, Germany, 2005. View at Google Scholar
  4. C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 5, pp. 765–770, 2002. View at Publisher · View at Google Scholar · View at Scopus
  5. R.-Z. Wang and S.-J. Shyu, “Scalable secret image sharing,” Signal Processing, vol. 22, no. 4, pp. 363–373, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. P.-Y. Lin and C.-S. Chan, “A verifiable and recoverable secret image sharing mechanism,” in Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA '11), pp. 288–293, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. C.-H. T. Yang, Y.-H. Huang, and J.-H. Syue, “Reversible secret image sharing based on Shamir's scheme with discrete haar wavelet transform,” in Proceedings of the 2nd Annual Conference on Electrical and Control Engineering (ICECE '11), pp. 1250–1253, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-C. Chang, P.-Y. Lin, Z. H. Wang, and M. C. Li, “A sudoku-based secret image sharing scheme with reversibility,” Journal of Communications, vol. 5, no. 1, pp. 5–12, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. T. Bhattacharjee, J. P. Singh, and A. Nag, “A lossless secret Image sharing scheme based on pixel partitioning,” International Journal of Electronics Communication and Computer Technology, vol. 2, no. 1, 2012. View at Google Scholar
  10. L. Jani Anbarasi and S. Kannan, “Secured secret color image sharing with steganography,” in Proceedings of the IEEE International Conference on Recent Trends in Information Technology (ICRTIT '12), pp. 44–48, 2012.
  11. M. Huang and V. Rego, “Polynomial evaluation in secret sharing schemes,” www.cs.purdue.edu/research/PaCS/polyeval.