How to share a secret with cheaters
Journal of Cryptology
Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
A concept of designing cheater identification methods for secret sharing
Journal of Systems and Software
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Invertible secret image sharing with steganography
Pattern Recognition Letters
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A hierarchical threshold secret image sharing
Pattern Recognition Letters
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
A DCT multi-channel image information sharing scheme in resisting JPEG lossy compression attack
IScIDE'11 Proceedings of the Second Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
Journal of Systems and Software
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Hi-index | 0.01 |
The (t, n)-threshold has been extended to secret image sharing due to its practicability. In this article, we provide a novel version that employs the modulus operator to embed the secret share into a host image. The simulator shows that the modulus operator is useful for decreasing shadow image distortion. Using Rabin's signature cryptosystem, participants can detect if a cheater exists in the cooperation. In particular, the new mechanism permits involved members to restore a lossless secret image and to reconstruct a distortion-free host image.