Communications of the ACM
Sharing multiple secrets in digital images
Journal of Systems and Software
Secret image sharing with steganography and authentication
Journal of Systems and Software
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Two secret sharing schemes based on Boolean operations
Pattern Recognition
A lossless data hiding scheme based on three-pixel block differences
Pattern Recognition
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Sharing secrets in stego images with authentication
Pattern Recognition
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Visual secret sharing by random grids revisited
Pattern Recognition
A live system for wavelet compression of high speed computer network measurements
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Secret Sharing With Public Reconstruction
IEEE Transactions on Information Theory
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Expansion Embedding Techniques for Reversible Watermarking
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
IEEE Transactions on Circuits and Systems for Video Technology
A hierarchical threshold secret image sharing
Pattern Recognition Letters
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
Journal of Systems and Software
A high capacity lossless data hiding scheme for JPEG images
Journal of Systems and Software
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Hi-index | 0.10 |
The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system and then calculate the information data used to reconstruct original pixels from camouflaged pixels such that the information data and transformed secret data are shared using the (t,n)-threshold sharing scheme. In this way, we can retrieve the lossless secret image and reverse the stego image to the original image. Based on our experiments, the shadows can be successfully camouflaged in the cover image, and the stego images have satisfactory quality. Moreover, our scheme allows for a large capacity of embedded secret data.