Communications of the ACM
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Colored visual cryptography scheme based on additive color mixing
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
Visual secret sharing for multiple secrets
Pattern Recognition
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
Secret image sharing based on cellular automata and steganography
Pattern Recognition
Some Extensions on Threshold Visual Cryptography Schemes
The Computer Journal
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Secret image sharing scheme with adaptive authentication strength
Pattern Recognition Letters
Hi-index | 0.00 |
Abstract: A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n''cover'' images. The resulting ''stego'' images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker's attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers (Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.