Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Improvements of image sharing with steganography and authentication

CN Yang, TS Chen, KH Yu, CC Wang - Journal of Systems and software, 2007 - Elsevier
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and
authentication to prevent participants from the incidental or intentional provision of a false …

Sharing secrets in stego images with authentication

CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with
steganography and authentication, which divide a secret image into the shadows and …

A high quality image sharing with steganography and adaptive authentication scheme

CC Wu, SJ Kao, MS Hwang - Journal of Systems and Software, 2011 - Elsevier
With the rapid growth of numerous multimedia applications and communications through
Internet, secret image sharing has been becoming a key technology for digital images in …

Invertible secret image sharing with steganography

PY Lin, CS Chan - Pattern Recognition Letters, 2010 - Elsevier
The essence of invertible image sharing approaches is that the revealed content of the
secret image must be lossless and the distorted stego images must be able to be reverted to …

Secret image sharing based on cellular automata and steganography

Z Eslami, SH Razzaghi, JZ Ahmadabadi - Pattern Recognition, 2010 - Elsevier
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The
Journal of Systems and Software 73 (2004) 405–414] and Yang et al.[Improvements of …

Steganography and authentication in image sharing without parity bits

CN Yang, JF Ouyang, L Harn - Optics Communications, 2012 - Elsevier
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS)
scheme was proposed to share a secret image into n stego-images. At the same time, one …

Efficient multi-secret image sharing based on Boolean operations

TH Chen, CS Wu - Signal Processing, 2011 - Elsevier
(n, n) visual secret sharing (VSS), first proposed by Naor and Shamir (1995)[4], is used to
encode (encrypt) a secret image into n meaningless share images to be superimposed later …

Secret image sharing with smaller shadow images

RZ Wang, CH Su - Pattern Recognition Letters, 2006 - Elsevier
Secret image sharing is a technique for protecting images that involves the dispersion of the
secret image into many shadow images. This endows the method with a higher tolerance …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …