CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and …
The pixel‐value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There …
TH Chen, CS Wu - Signal Processing, 2011 - Elsevier
(n, n) visual secret sharing (VSS), first proposed by Naor and Shamir (1995)[4], is used to encode (encrypt) a secret image into n meaningless share images to be superimposed later …
L Xiong, X Zhong, CN Yang - Signal Processing, 2020 - Elsevier
Abstract Recently, Secret Image Sharing (SIS) has attracted more and more researchers' attention, in which a secret image is divided into several shadows for sharing. In practice, the …
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405–414] and Yang et al.[Improvements of …
More and more studies have been dedicated to investigating secret sharing with steganography. Unfortunately, no previous work has ever reported its capability to resist …
AAA Gutub, KA Alaseri - Journal of King Saud University-Computer and …, 2021 - Elsevier
Sensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which …
The crucial challenge that decides the success of any steganographic algorithm lies in simultaneously achieving the three contradicting objectives namely—higher payload …
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS) scheme was proposed to share a secret image into n stego-images. At the same time, one …