Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

Sharing secrets in stego images with authentication

CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with
steganography and authentication, which divide a secret image into the shadows and …

A Steganographic Method Based on Pixel‐Value Differencing and the Perfect Square Number

HW Tseng, HS Leng - Journal of Applied Mathematics, 2013 - Wiley Online Library
The pixel‐value differencing (PVD) scheme uses the difference value between two
consecutive pixels in a block to determine how many secret bits should be embedded. There …

Efficient multi-secret image sharing based on Boolean operations

TH Chen, CS Wu - Signal Processing, 2011 - Elsevier
(n, n) visual secret sharing (VSS), first proposed by Naor and Shamir (1995)[4], is used to
encode (encrypt) a secret image into n meaningless share images to be superimposed later …

DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication

L Xiong, X Zhong, CN Yang - Signal Processing, 2020 - Elsevier
Abstract Recently, Secret Image Sharing (SIS) has attracted more and more researchers'
attention, in which a secret image is divided into several shadows for sharing. In practice, the …

Secret image sharing based on cellular automata and steganography

Z Eslami, SH Razzaghi, JZ Ahmadabadi - Pattern Recognition, 2010 - Elsevier
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The
Journal of Systems and Software 73 (2004) 405–414] and Yang et al.[Improvements of …

Secret sharing with multi-cover adaptive steganography

HD Yuan - Information Sciences, 2014 - Elsevier
More and more studies have been dedicated to investigating secret sharing with
steganography. Unfortunately, no previous work has ever reported its capability to resist …

[HTML][HTML] Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing

AAA Gutub, KA Alaseri - Journal of King Saud University-Computer and …, 2021 - Elsevier
Sensitive information requires many security systems to be protected by secret keys. One of
these practical security systems is the so-called counting-based secret sharing, in which …

High payload image steganography with reduced distortion using octonary pixel pairing scheme

C Balasubramanian, S Selvakumar… - Multimedia tools and …, 2014 - Springer
The crucial challenge that decides the success of any steganographic algorithm lies in
simultaneously achieving the three contradicting objectives namely—higher payload …

Steganography and authentication in image sharing without parity bits

CN Yang, JF Ouyang, L Harn - Optics Communications, 2012 - Elsevier
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS)
scheme was proposed to share a secret image into n stego-images. At the same time, one …