L Bao, S Yi, Y Zhou - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
This paper first introduces a (k, n)-sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining …
L Xiong, X Zhong, CN Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Secret Image Sharing (SIS) as a secure data sharing scheme in multiple cover images, has become an increasing researchers' concern. In traditional SIS, the cover image can't be …
B Feng, W Lu, W Sun - IEEE transactions on Information …, 2014 - ieeexplore.ieee.org
Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are …
The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to …
A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the …
X Zhang, S Wang - Pattern Recognition Letters, 2004 - Elsevier
The pixel-value differencing (PVD) steganography can embed a large amount of secret bits into a still image with high imperceptibility as it makes use of the characteristics of human …
A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of secret shares to be used within …
MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are facing several challenges including the low capacity, poor robustness and imperceptibility …
A AbdelRaouf - Multimedia Tools and Applications, 2021 - Springer
The increase of data communication globally requires secure exchange of private information. Steganography is a common form of information hiding from an unauthorized …