A common method of share authentication in image secret sharing

X Yan, Y Lu, CN Yang, X Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …

Combination of Sharing Matrix and Image Encryption for Lossless -Secret Image Sharing

L Bao, S Yi, Y Zhou - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
This paper first introduces a (k, n)-sharing matrix S (k, n) and its generation algorithm.
Mathematical analysis is provided to show its potential for secret image sharing. Combining …

Transform domain-based invertible and lossless secret image sharing with authentication

L Xiong, X Zhong, CN Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Secret Image Sharing (SIS) as a secure data sharing scheme in multiple cover images, has
become an increasing researchers' concern. In traditional SIS, the cover image can't be …

Secure binary image steganography based on minimizing the distortion on the texture

B Feng, W Lu, W Sun - IEEE transactions on Information …, 2014 - ieeexplore.ieee.org
Most state-of-the-art binary image steganographic techniques only consider the flipping
distortion according to the human visual system, which will be not secure when they are …

Invertible secret image sharing with steganography

PY Lin, CS Chan - Pattern Recognition Letters, 2010 - Elsevier
The essence of invertible image sharing approaches is that the revealed content of the
secret image must be lossless and the distorted stego images must be able to be reverted to …

[HTML][HTML] Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security

X Zhang, S Wang - Pattern Recognition Letters, 2004 - Elsevier
The pixel-value differencing (PVD) steganography can embed a large amount of secret bits
into a still image with high imperceptibility as it makes use of the characteristics of human …

Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage

A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The
models are structured to serve personal remembrance of secret shares to be used within …

High payload image steganography scheme with minimum distortion based on distinction grade value method

MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are
facing several challenges including the low capacity, poor robustness and imperceptibility …

A new data hiding approach for image steganography based on visual color sensitivity

A AbdelRaouf - Multimedia Tools and Applications, 2021 - Springer
The increase of data communication globally requires secure exchange of private
information. Steganography is a common form of information hiding from an unauthorized …