Ininvertible cellular automata: a review
Physica D
Communications of the ACM
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Pattern Recognition Letters
Efficient visual secret sharing scheme for color images
Pattern Recognition
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Sharing secrets in stego images with authentication
Pattern Recognition
Spread spectrum image steganography
IEEE Transactions on Image Processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
A verifiable multi-secret sharing scheme based on cellular automata
Information Sciences: an International Journal
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A hierarchical threshold secret image sharing
Pattern Recognition Letters
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Journal of Systems and Software
Hi-index | 0.01 |
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414] and Yang et al. [Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076] proposed secret image sharing schemes combining steganography and authentication based on Shamir's polynomials. The schemes divide a secret image into some shadows which are then embedded in cover images in order to produce stego images for distributing among participants. To achieve better authentication ability Chang et al. [Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137] proposed in 2008 an improved scheme which enhances the visual quality of the stego images as well and the probability of successful verification for a fake stego block is 1/16. In this paper, we employ linear cellular automata, digital signatures, and hash functions to propose a novel (t,n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256. Employing cellular automata instead of Shamir's polynomials not only improves computational complexity from O(nlog^2n) to O(n) but obviates the need to modify pixels of cover images unnecessarily. Compared to previous methods [C. Lin, W. Tsai, Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414; C. Yang, T. Chen, K. Yu, C. Wang, Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076; C. Chang, Y. Hsieh, C. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137], we use fewer number of bits in each pixel of cover images for embedding data so that a better visual quality is guaranteed. We further present some experimental results.