Processing math: 100%
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (45)

Search Parameters:
Keywords = Galois field

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 977 KiB  
Article
Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
by Mikolaj Karpinski, Artem Sokolov, Aizhan Tokkuliyeva, Volodymyr Radush, Nadiia Kazakova, Aigul Shaikhanova, Nataliya Zagorodna and Anna Korchenko
Electronics 2025, 14(10), 2094; https://doi.org/10.3390/electronics14102094 - 21 May 2025
Viewed by 150
Abstract
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction [...] Read more.
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction applied in the AES cryptographic algorithm—are particularly important. An integral component of the Nyberg construction is the affine transformation, which is used to improve the avalanche and correlation properties of the S-box. In this paper, a new approach is adopted for synthesizing affine transformations for S-boxes based on the quaternary matrices over the Galois field GF(4). We describe four basic structures that serve as the foundation for synthesizing a complete class of 648 affine transformation matrices of order n = 3 and a class of 7776 matrices of order n = 4 and introduce a recurrent structure to facilitate the synthesis of matrices for higher orders. Using these matrices in combination with the Nyberg construction, it is possible to construct bijective S-boxes that outperform the original Nyberg construction and many other known S-boxes in terms of strict avalanche criterion (SAC) and bit independence criterion strict avalanche criterion (BIC SAC) values, while maintaining a maximal level of nonlinearity and good cryptographic properties. We also propose modified GF(4) affine transformations that can be applied to specialized S-boxes which already satisfy the SAC for both component Boolean and 4-functions, as well as the criterion of minimal correlation between input and output, allowing us to enhance their nonlinearity to the value of Nf = 96. We integrate the synthesized S-boxes into the AES algorithm and evaluate their practical performance. The encryption outputs successfully pass the NIST statistical test suite in 96 out of 100 cases, outperforming both the original AES S-box and other reference constructions, confirming the practical strength of the proposed method. Full article
Show Figures

Figure 1

21 pages, 5152 KiB  
Article
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24)
by Phuc-Phan Duong, Tuan-Kiet Dang, Trong-Thuc Hoang and Cong-Kha Pham
Cryptography 2025, 9(2), 21; https://doi.org/10.3390/cryptography9020021 - 3 Apr 2025
Viewed by 640
Abstract
Substitution boxes (S-Boxes) function as essential nonlinear elements in contemporary cryptographic systems, offering robust protection against cryptanalytic attacks. This study presents a novel technique for generating compact 8-bit S-Boxes based on multiplication in the Galois Field GF(24). [...] Read more.
Substitution boxes (S-Boxes) function as essential nonlinear elements in contemporary cryptographic systems, offering robust protection against cryptanalytic attacks. This study presents a novel technique for generating compact 8-bit S-Boxes based on multiplication in the Galois Field GF(24). The goal of this method is to create S-Boxes with low hardware implementation cost while ensuring cryptographic properties. Experimental results indicate that the suggested S-Boxes achieve a nonlinearity value of 112, matching the AES S-Box. They also maintain other cryptographic properties, such as the Bit Independence Criterion (BIC), the Strict Avalanche Criterion (SAC), Differential Approximation Probability, and Linear Approximation Probability, within acceptable security thresholds. Notably, compared to existing studies, the proposed S-Box architecture demonstrates enhanced hardware efficiency, significantly reducing resource utilization in implementations. Specifically, the implementation cost of the S-Box consists of 31 XOR gates, 32 two-input AND gates, 6 two-input OR gates, and 2 MUX21s. Moreover, this work provides a thorough assessment of the S-Box, covering cryptographic properties, side channel attacks, and implementation aspects. Furthermore, the study estimates the quantum resource requirements for implementing the S-Box, including an analysis of CNOT, Toffoli, and NOT gate counts. Full article
(This article belongs to the Special Issue Emerging Topics in Hardware Security)
Show Figures

Figure 1

21 pages, 1375 KiB  
Article
Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes
by Rongchi Xu, Peiyao Chen, Ling Liu, Min Zhu and Baoming Bai
Entropy 2025, 27(4), 377; https://doi.org/10.3390/e27040377 - 2 Apr 2025
Viewed by 299
Abstract
In this paper, we discuss non-binary polar codes using a 2×2 matrix over a Galois field GF(2q) as the kernel. Conventional construction of non-binary polar codes divides the synthesized channels into frozen channels and information channels. Each information [...] Read more.
In this paper, we discuss non-binary polar codes using a 2×2 matrix over a Galois field GF(2q) as the kernel. Conventional construction of non-binary polar codes divides the synthesized channels into frozen channels and information channels. Each information channel carries one symbol, i.e., q bits. However, there are many middle channels with insufficient polarization, which cannot carry one symbol of q bits but only i bits, 1i<q,iZ, at finite block length. In this paper, we consider bit-level construction for multiplicative repetition (MR)-based non-binary polar codes and propose a bit-level construction based on the two following methods. We first calculate the error probability and channel capacity lower bound of each synthesized channel based on the channel degradation method, and then determine both the number and index of the carried bits for each synthesized channel according to the symbol error probability and capacity. To reduce complexity, we also introduce a Monte-Carlo method. We compute the error probability of each synthesized channel carrying i information bits and select the optimal construction that can minimize the union bound of the error probability. Finally, an improved construction-based probabilistic shaping method for MR-based non-binary polar codes is considered. Simulation results show that the proposed construction significantly improved the decoding performance compared with the conventional construction scheme. Full article
(This article belongs to the Special Issue Advances in Modern Channel Coding)
Show Figures

Figure 1

18 pages, 631 KiB  
Article
Prospects for Using Finite Algebraic Rings for Constructing Discrete Coordinate Systems
by Ibragim Suleimenov and Akhat Bakirov
Symmetry 2025, 17(3), 410; https://doi.org/10.3390/sym17030410 - 9 Mar 2025
Viewed by 496
Abstract
The method of non-standard algebraic extensions based on the use of additional formal solutions of the reduced equations is extended to the case corresponding to three-dimensional space. This method differs from the classical one in that it leads to the formation of algebraic [...] Read more.
The method of non-standard algebraic extensions based on the use of additional formal solutions of the reduced equations is extended to the case corresponding to three-dimensional space. This method differs from the classical one in that it leads to the formation of algebraic rings rather than fields. The proposed approach allows one to construct a discrete coordinate system in which the role of three basis vectors is played by idempotent elements of the ring obtained by a non-standard algebraic extension. This approach allows, among other things, the identification of the symmetry properties of objects defined through discrete Cartesian coordinates, which is important, for example, when using advanced methods of digital image processing. An explicit form of solutions of the equations is established that allow one to construct idempotent elements for Galois fields GF(p) such that p1 is divisible by three. The possibilities of practical use of the proposed approach are considered; in particular, it is shown that the use of discrete Cartesian coordinates mapped onto algebraic rings is of interest from the point of view of improving UAV swarm control algorithms. Full article
(This article belongs to the Special Issue Symmetry in Computing Algorithms and Applications)
Show Figures

Figure 1

22 pages, 2728 KiB  
Article
Hybrid Dynamic Galois Field with Quantum Resilience for Secure IoT Data Management and Transmission in Smart Cities Using Reed–Solomon (RS) Code
by Abdullah Aljuhni, Amer Aljaedi, Adel R. Alharbi, Ahmed Mubaraki and Moahd K. Alghuson
Symmetry 2025, 17(2), 259; https://doi.org/10.3390/sym17020259 - 8 Feb 2025
Cited by 1 | Viewed by 934
Abstract
The Internet of Things (IoT), which is characteristic of the current industrial revolutions, is the connection of physical devices through different protocols and sensors to share information. Even though the IoT provides revolutionary opportunities, its connection to the current Internet for smart cities [...] Read more.
The Internet of Things (IoT), which is characteristic of the current industrial revolutions, is the connection of physical devices through different protocols and sensors to share information. Even though the IoT provides revolutionary opportunities, its connection to the current Internet for smart cities brings new opportunities for security threats, especially with the appearance of new threats like quantum computing. Current approaches to protect IoT data are not immune to quantum attacks and are not designed to offer the best data management for smart city applications. Thus, post-quantum cryptography (PQC), which is still in its research stage, aims to solve these problems. To this end, this research introduces the Dynamic Galois Reed–Solomon with Quantum Resilience (DGRS-QR) system to improve the secure management and communication of data in IoT smart cities. The data preprocessing includes K-Nearest Neighbors (KNN) and min–max normalization and then applying the Galois Field Adaptive Expansion (GFAE). Optimization of the quantum-resistant keys is accomplished by applying Artificial Bee Colony (ABC) and Moth Flame Optimization (MFO) algorithms. Also, role-based access control provides strong cloud data security, and quantum resistance is maintained by refreshing keys every five minutes of the active session. For error correction, Reed–Solomon (RS) codes are used which provide data reliability. Data management is performed using an attention-based Bidirectional Long Short-Term Memory (Att-Bi-LSTM) model with skip connections to provide optimized city management. The proposed approach was evaluated using key performance metrics: a key generation time of 2.34 s, encryption time of 4.56 s, decryption time of 3.56 s, PSNR of 33 dB, and SSIM of 0.99. The results show that the proposed system is capable of protecting IoT data from quantum threats while also ensuring optimal data management and processing. Full article
(This article belongs to the Special Issue New Advances in Symmetric Cryptography)
Show Figures

Figure 1

21 pages, 983 KiB  
Article
Discrete Cartesian Coordinate Transformations: Using Algebraic Extension Methods
by Aruzhan Kadyrzhan, Dinara Matrassulova, Yelizaveta Vitulyova and Ibragim Suleimenov
Appl. Sci. 2025, 15(3), 1464; https://doi.org/10.3390/app15031464 - 31 Jan 2025
Cited by 1 | Viewed by 834
Abstract
It is shown that it is reasonable to use Galois fields, including those obtained by algebraic extensions, to describe the position of a point in a discrete Cartesian coordinate system in many cases. This approach is applicable to any problem in which the [...] Read more.
It is shown that it is reasonable to use Galois fields, including those obtained by algebraic extensions, to describe the position of a point in a discrete Cartesian coordinate system in many cases. This approach is applicable to any problem in which the number of elements (e.g., pixels) into which the considered fragment of the plane is dissected is finite. In particular, it is obviously applicable to the processing of the vast majority of digital images actually encountered in practice. The representation of coordinates using Galois fields of the form GF(p2) is a discrete analog of the representation of coordinates in the plane through a complex variable. It is shown that two different types of algebraic extensions can be used simultaneously to represent transformations of discrete Cartesian coordinates described through Galois fields. One corresponds to the classical scheme, which uses irreducible algebraic equations. The second type proposed in this report involves the use of a formal additional solution of some equation, which has a usual solution. The correctness of this approach is justified through the representation of the elements obtained by the algebraic expansion of the second type by matrices defined over the basic Galois field. It is shown that the proposed approach is the basis for the development of new methods of information protection, designed to control groups of UAVs in the zone of direct radio visibility. The algebraic basis of such methods is the solution of systems of equations written in terms of finite algebraic structures. Full article
Show Figures

Figure 1

8 pages, 227 KiB  
Article
Error Correction for Check Digit Systems over p-Groups and Applications to DNA Sequences
by Louis Beaugris
Mathematics 2025, 13(2), 211; https://doi.org/10.3390/math13020211 - 10 Jan 2025
Viewed by 674
Abstract
Statistical analysis shows that the most common errors in the transmission of information consist of single errors and transposition errors. Error detection and correction methods are often desired, particularly when the accuracy of information is of crucial importance. Inspired by a check digit [...] Read more.
Statistical analysis shows that the most common errors in the transmission of information consist of single errors and transposition errors. Error detection and correction methods are often desired, particularly when the accuracy of information is of crucial importance. Inspired by a check digit system constructed from the companion matrix of a primitive polynomial over the integers Zp and that focused on error detection, this work develops error-correction formulas for single errors and transposition errors for that check digit scheme. We also propose an application to DNA sequences. Full article
18 pages, 302 KiB  
Article
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
by George Teşeleanu
Cryptography 2025, 9(1), 2; https://doi.org/10.3390/cryptography9010002 - 28 Dec 2024
Viewed by 847
Abstract
An RSA generalization using complex integers was introduced by Elkamchouchi, Elshenawy and Shaban in 2002. This scheme was further extended by Cotan and Teșeleanu to Galois fields of order n1. In this generalized framework, the key equation is [...] Read more.
An RSA generalization using complex integers was introduced by Elkamchouchi, Elshenawy and Shaban in 2002. This scheme was further extended by Cotan and Teșeleanu to Galois fields of order n1. In this generalized framework, the key equation is edk(pn1)(qn1)=1, where p and q are prime numbers. Note that the classical RSA and Elkamchouchi et al.’s key equations are special cases, namely, when n=1 and n=2. In addition to introducing this generic family, Cotan and Teșeleanu described a continued fractions attack capable of recovering the secret key d if d<N0.25n. This bound was later improved by Teșeleanu using a lattice-based method. In this paper, we explore other lattice attacks that could lead to factoring the modulus N=pq, namely, we propose a series of partial exposure attacks that can aid an adversary in breaking this family of cryptosystems if certain conditions hold. Full article
17 pages, 3072 KiB  
Article
Application of the Algebraic Extension Method to the Construction of Orthogonal Bases for Partial Digital Convolutions
by Aruzhan Kadyrzhan, Akhat Bakirov, Dina Shaltykova and Ibragim Suleimenov
Algorithms 2024, 17(11), 496; https://doi.org/10.3390/a17110496 - 3 Nov 2024
Viewed by 820
Abstract
Mathematical tools have been developed that are analogous to the tool that allows one to reduce the description of linear systems in terms of convolution operations to a description in terms of amplitude-frequency characteristics. These tools are intended for use in cases where [...] Read more.
Mathematical tools have been developed that are analogous to the tool that allows one to reduce the description of linear systems in terms of convolution operations to a description in terms of amplitude-frequency characteristics. These tools are intended for use in cases where the system under consideration is described by partial digital convolutions. The basis of the proposed approach is the Fourier–Galois transform using orthogonal bases in corresponding fields. As applied to partial convolutions, the Fourier–Galois transform is decomposed into a set of such transforms, each of which corresponds to operations in a certain Galois field. It is shown that for adequate application of the Fourier–Galois transform to systems described by partial convolutions, it is necessary to ensure the same number of cycles in each of the transforms from the set specified above. To solve this problem, the method of algebraic extensions was used, a special case of which is the transition from real numbers to complex numbers. In this case, the number of cycles varies from p to pn/k, where p is a prime number, n and k are integers, and an arbitrary number divisor of pn can be chosen as k. This allows us to produce partial Fourier–Galois transforms corresponding to different Galois fields, for the same number of cycles. A specific example is presented demonstrating the constructiveness of the proposed approach. Full article
(This article belongs to the Section Analysis of Algorithms and Complexity Theory)
Show Figures

Figure 1

13 pages, 8080 KiB  
Article
Linguistic Secret Sharing via Ambiguous Token Selection for IoT Security
by Kai Gao, Ji-Hwei Horng, Ching-Chun Chang and Chin-Chen Chang
Electronics 2024, 13(21), 4216; https://doi.org/10.3390/electronics13214216 - 27 Oct 2024
Cited by 2 | Viewed by 1009
Abstract
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to [...] Read more.
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to embed private data within texts transmitted by IoT devices, using an ambiguous token selection algorithm that maintains the textual integrity of the cover messages. Our approach eliminates the need to share additional information for accurate data extraction while also enhancing security through a secret sharing mechanism. Experimental results demonstrate that the proposed scheme achieves approximately 50% accuracy in detecting steganographic text across two steganalysis networks. Additionally, the generated steganographic text preserves the semantic information of the cover text, evidenced by a BERT score of 0.948. This indicates that the proposed scheme performs well in terms of security. Full article
(This article belongs to the Special Issue IoT Security in the Age of AI: Innovative Approaches and Technologies)
Show Figures

Figure 1

22 pages, 3296 KiB  
Article
Electronic Fourier–Galois Spectrum Analyzer for the Field GF(31)
by Kaisarali Kadyrzhan, Daulet Kaldybekov, Saltanat Baipakbaeva, Yelizaveta Vitulyova, Dinara Matrassulova and Ibragim Suleimenov
Appl. Sci. 2024, 14(17), 7770; https://doi.org/10.3390/app14177770 - 3 Sep 2024
Cited by 2 | Viewed by 1053
Abstract
A scheme for the Fourier–Galois spectrum analyzer for the field GF(31) is proposed. It is shown that this analyzer allows for solving a wide enough range of problems related to image processing, in particular those arising in the course of experimental studies [...] Read more.
A scheme for the Fourier–Galois spectrum analyzer for the field GF(31) is proposed. It is shown that this analyzer allows for solving a wide enough range of problems related to image processing, in particular those arising in the course of experimental studies in the field of physical chemistry. Such images allow digital processing when divided into a relatively small number of pixels, which creates an opportunity to use Galois fields of relatively small size. The choice of field GF(31) is due to the fact that the number 31 is a Mersenne prime number, which considerably simplifies the algorithm of calculating the Fourier–Galois transform in this field. The proposed scheme of the spectrum analyzer is focused on the use of threshold sensors, at the output of which signals corresponding to binary logic are formed. Due to this fact, further simplification of the proposed analyzer scheme is achieved. The constructiveness of the proposed approach is proven using digital modeling of electronic circuits. It is concluded that when solving applied problems in which an image can be divided into a relatively small number of pixels, it is important to take into account the specificity of particular Galois fields used for their digital processing. Full article
Show Figures

Figure 1

27 pages, 18674 KiB  
Article
An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy
by Mohammad Mazyad Hazzazi, Souad Ahmad Baowidan, Awais Yousaf and Muhammad Adeel
Symmetry 2024, 16(8), 1070; https://doi.org/10.3390/sym16081070 - 19 Aug 2024
Cited by 2 | Viewed by 1452
Abstract
Data security and privacy have become essential due to the increasingly advanced interconnectivity in today’s world, hence the reliance on cryptography. This paper introduces a new algorithm that uses a novel hybrid Tent–May chaotic map to generate pseudo-random numbers, as well as block [...] Read more.
Data security and privacy have become essential due to the increasingly advanced interconnectivity in today’s world, hence the reliance on cryptography. This paper introduces a new algorithm that uses a novel hybrid Tent–May chaotic map to generate pseudo-random numbers, as well as block encryption. We design a robust S-box by combining the Tent and May Maps, which yields a chaotic system with improved cryptographic properties. This S-box is a critical cryptographic primitive that significantly improves encryption security and leverages the strengths of both maps. The encryption process involves two key steps: block-wise substitution and permutation. First, we divide the image into 16×16 blocks, then substitute each pixel with the 8byte key and S-box. Next, we convert the encrypted image back into vector form, reorganize it using the permutation vector based on the subgroups of S16, and finally return it to its original form. This approach greatly improves block cipher security when used, especially to protect medical images by guaranteeing their confidentiality and noninterference. Performance measures like PSNR, UACI, MSE, NCC, AD, SC, MD, and NAE prove how immune our method is to various cryptographic and statistical attacks, making it more accurate and more secure than the existing techniques. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

26 pages, 6368 KiB  
Article
Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme
by Souad Ahmad Baowidan, Ahmed Alamer, Mudassir Hassan and Awais Yousaf
Symmetry 2024, 16(8), 954; https://doi.org/10.3390/sym16080954 - 25 Jul 2024
Cited by 2 | Viewed by 1199
Abstract
Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today’s digitally connected world. In this article, we introduce a new [...] Read more.
Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today’s digitally connected world. In this article, we introduce a new technique for the construction of non-linear components in block ciphers. The proposed S-box generation process is a transformational procedure through which the elements of a finite field are mapped onto highly nonlinear permutations. This transformation is achieved through a series of algebraic and combinatorial operations. It involves group actions on some pairs of two Galois fields to create an initial S-box Pr Sbox, which induces a rich algebraic structure. The post S-box Po Sbox, which is derived from heuristic group-based optimization, leads to high nonlinearity and other important cryptographic parameters. The proposed S-box demonstrates resilience against various attacks, making the system resistant to statistical vulnerabilities. The investigation reveals remarkable attributes, including a nonlinearity score of 112, an average Strict Avalanche Criterion score of 0.504, and LAP (Linear Approximation Probability) score of 0.062, surpassing well-established S-boxes that exhibit desired cryptographic properties. This novel methodology suggests an encouraging approach for enhancing the security framework of block ciphers. In addition, we also proposed a three-step image encryption technique comprising of Row Permutation, Bitwise XOR, and block-wise substitution using Po Sbox. These operations contribute to adding more levels of randomness, which improves the dispersion across the cipher image and makes it equally intense. Therefore, we were able to establish that the approach works to mitigate against statistical and cryptanalytic attacks. The PSNR, UACI, MSE, NCC, AD, SC, MD, and NAE data comparisons with existing methods are also provided to prove the efficiency of the encryption algorithm. Full article
Show Figures

Figure 1

19 pages, 2015 KiB  
Article
Peculiarities of Applying Partial Convolutions to the Computation of Reduced Numerical Convolutions
by Ibragim Suleimenov, Aruzhan Kadyrzhan, Dinara Matrassulova and Yelizaveta Vitulyova
Appl. Sci. 2024, 14(14), 6388; https://doi.org/10.3390/app14146388 - 22 Jul 2024
Cited by 3 | Viewed by 1100
Abstract
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values [...] Read more.
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values in the same discrete scale as the original functions. The method is based on the use of partial convolutions, reduced to computing a modulo integer q0, which is the product of several prime numbers: q0=p1p2pn. It is shown that it is appropriate to use the expansion of the number q0, to q=p0p1p2pn, where p0 is an additional prime number, to compute the reduced digital convolution. This corresponds to the use of additional digits in the number system used to convert to partial convolutions. The inverse procedure, i.e., reducing the result of calculations modulo q to the result corresponding to calculations modulo q0, is provided by the formula that used only integers proved in this paper. The possibilities of practical application of the obtained results are discussed. Full article
Show Figures

Figure 1

20 pages, 10850 KiB  
Article
Reversible Data Hiding in Crypto-Space Images with Polynomial Secret Sharing over Galois Field
by Hao-Wei Lu, Jui-Chuan Liu, Chin-Chen Chang and Ji-Hwei Horng
Electronics 2024, 13(14), 2860; https://doi.org/10.3390/electronics13142860 - 20 Jul 2024
Cited by 1 | Viewed by 1107
Abstract
Secret sharing is a data security technique that divides secret information into multiple parts, embeds these parts into various shares, and distributes these shares to different participants. The original secret information can be retrieved only when the number of shares gathered meets a [...] Read more.
Secret sharing is a data security technique that divides secret information into multiple parts, embeds these parts into various shares, and distributes these shares to different participants. The original secret information can be retrieved only when the number of shares gathered meets a required threshold. This paper proposes a secret sharing method that can hide data in encrypted images with reversibility and allows content owners to add an additional layer of security before uploading data to the cloud. This method enables the independent extraction of images and data, ensuring that the recovered images and extracted data can serve as validation information for each other. The proposed method not only enhances data security but also guarantees the accuracy of the extracted information. Full article
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)
Show Figures

Figure 1

Back to TopTop