Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Pattern Recognition Letters
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Efficient visual secret sharing scheme for color images
Pattern Recognition
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
New directions in cryptography
IEEE Transactions on Information Theory
Common randomness in information theory and cryptography. I. Secret sharing
IEEE Transactions on Information Theory
Decomposition constructions for secret-sharing schemes
IEEE Transactions on Information Theory
Universally ideal secret-sharing schemes
IEEE Transactions on Information Theory
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
A novel secret image sharing scheme for true-color images with size constraint
Information Sciences: an International Journal
A verifiable multi-secret sharing scheme based on cellular automata
Information Sciences: an International Journal
Max-plus algebra-based wavelet transforms and their FPGA implementation for image coding
Information Sciences: an International Journal
Invertible secret image sharing with steganography
Pattern Recognition Letters
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
Secure masks for visual cryptography
Transactions on data hiding and multimedia security V
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Multi-image encryption by circular random grids
Information Sciences: an International Journal
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Verifiable multi-secret sharing based on LFSR sequences
Theoretical Computer Science
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Random grid-based visual secret sharing with abilities of OR and XOR decryptions
Journal of Visual Communication and Image Representation
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Image cryptographic algorithm based on the Haar wavelet transform
Information Sciences: an International Journal
Hi-index | 0.07 |
Over the past several years, secret image sharing techniques have become another branch of the effort to prevent secret images from being eavesdropped on, in addition to traditional cryptography. Because smaller shadows can speed up the transmission of a secret color image, in this paper we combine Chang and Wu's gradual search algorithm for a single bitmap BTC (GSBTC) and Shamir's (k,n) threshold concept to propose a novel secret color image sharing scheme that generates smaller shadows. Experimental results confirm that the proposed scheme successfully reduces shadow size and that each shadow behaves as a random-like image that prevents leakage of information about the secret color image. Furthermore, the correlation between two vertically or horizontally adjacent pixels in each shadow is significantly less than those in a color secret image, and the presented scheme also achieves, on average, an NPCR=0.414% and AUCI=32.78%. Thus, with our scheme one-pixel difference could cause a significant difference in the corresponding shadows. Therefore, the security of the presented scheme is also confirmed.