Communications of the ACM
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Pattern Recognition Letters
Efficient visual secret sharing scheme for color images
Pattern Recognition
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
User-friendly image sharing using polynomials with different primes
International Journal of Imaging Systems and Technology
Spread spectrum image steganography
IEEE Transactions on Image Processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
Sharing a verifiable secret image using two shadows
Pattern Recognition
Secret image sharing based on cellular automata and steganography
Pattern Recognition
A novel CRT-based watermarking technique for authentication of multimedia contents
Digital Signal Processing
A new sharing secret algorithm in stego images with authentication
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
A new scheme of sharing secrets in stego images with authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
Invertible secret image sharing with steganography
Pattern Recognition Letters
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
An image authentication scheme based on digital watermarking and image secret sharing
Multimedia Tools and Applications
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
A hierarchical threshold secret image sharing
Pattern Recognition Letters
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Secret image sharing scheme with adaptive authentication strength
Pattern Recognition Letters
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
Journal of Systems and Software
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.01 |
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego images so as to be transmitted to authorized recipients securely. In addition, these schemes also involve their authentication mechanisms to verify the integrity of the stego images such that the secret image can be restored correctly. Unfortunately, these schemes still have two shortcomings. One is that the weak authentication cannot well protect the integrity of the stego images, so the secret image cannot be recovered completely. The other shortcoming is that the visual quality of the stego images is not good enough. To overcome such drawbacks, in this paper, we propose a novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT). The proposed scheme not only improves the authentication ability but also enhances the visual quality of the stego images. The experimental results show that the proposed scheme is superior to the previously existing methods.