Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Sharing a verifiable secret image using two shadows
Pattern Recognition
Self-verifying visual secret sharing using error diffusion and interpolation techniques
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Invertible secret image sharing with steganography
Pattern Recognition Letters
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A hierarchical threshold secret image sharing
Pattern Recognition Letters
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A DCT multi-channel image information sharing scheme in resisting JPEG lossy compression attack
IScIDE'11 Proceedings of the Second Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Technical Section: Energy-aware hybrid precision selection framework for mobile GPUs
Computers and Graphics
Hi-index | 0.00 |
A verifiable image secret sharing scheme, which is based on the Thien-Lin scheme and the intractability of the discrete logarithm, is proposed in this paper. The new scheme can identify the cheaters no matter if she/he is the original secret image holder or the participant; because each participant chooses her/his own secret shadow by her/himself, the new system doesn't need a security channel; Due to the same fact, the secret shadow of each participant can be reused. In addition, the size of each shadow image, same as the Thien-Lin scheme, is smaller than that of the original secret image.