Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
Efficient visual secret sharing scheme for color images
Pattern Recognition
Fault-tolerant and progressive transmission of images
Pattern Recognition
Hi-index | 0.00 |
This work presents a secret image sharing approach for sharing several secret images while reducing each participants possessing load to only one shared image. The proposed approach employs a random image and a hash function to create corresponding random-like shift images for each secret image, and then publishes the generated images. The random image is then secretly shared to each participant, such that each participant can only possess one shared image to recover the random image, thus enabling the computation of all secret images. The contiguous hash results modify the secret images to random-like public images that are secure for malicious attacks. Experimental results indicate that the proposed method can share several secret images but reduce the possessing load of each participant efficiently. Attacks on shared or public images are also discussed.