A high quality image sharing with steganography and adaptive authentication scheme

CC Wu, SJ Kao, MS Hwang - Journal of Systems and Software, 2011 - Elsevier
With the rapid growth of numerous multimedia applications and communications through
Internet, secret image sharing has been becoming a key technology for digital images in …

A secure image sharing scheme with high quality stego-images based on steganography

J He, W Lan, S Tang - Multimedia Tools and Applications, 2017 - Springer
Image sharing can be utilized to protect important commercial, military or private images
against a single point of failure. Many existing image sharing schemes may have one or …

Sharing secrets in stego images with authentication

CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with
steganography and authentication, which divide a secret image into the shadows and …

Improvements of image sharing with steganography and authentication

CN Yang, TS Chen, KH Yu, CC Wang - Journal of Systems and software, 2007 - Elsevier
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and
authentication to prevent participants from the incidental or intentional provision of a false …

A new approach to the secret image sharing with steganography and authentication

CC Wu, MS Hwang, SJ Kao - The Imaging Science Journal, 2009 - Taylor & Francis
Steganography can be viewed as cryptography. It includes a variety of secret
communication methods that embed the existence of the message and makes it appear …

An adaptive secret image sharing with a new bitwise steganographic property

J Zarepour-Ahmadabadi, MES Ahmadabadi… - Information Sciences, 2016 - Elsevier
Recently, numerous studies have been conducted in the area of secret image sharing and
steganography. The main objective of these schemes is to produce high-quality tampering …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms

AM Ahmadian, M Amirmazlaghani - Signal Processing: Image …, 2019 - Elsevier
Secret image sharing schemes are employed to safeguard the confidentiality and availability
of critical commercial or military images. However, many of the existing image sharing …

Secret image sharing with authentication-chaining and dynamic embedding

Z Eslami, JZ Ahmadabadi - Journal of Systems and Software, 2011 - Elsevier
A popular technique to share a secret image among n participants is to divide it first into
some shadow images and then embed the shadows in n” cover” images. The resulting …

Secret image sharing scheme with adaptive authentication strength

G Ulutas, M Ulutas, VV Nabiyev - Pattern Recognition Letters, 2013 - Elsevier
Transmission of secret messages or images over the Internet using Shamir's secret sharing
scheme has become popular. Some researchers use steganography with Shamir's method …