Visual cryptography for grey level images
Information Processing Letters
Cheating in Visual Cryptography
Designs, Codes and Cryptography
A Reliable (k, n) Image Secret Sharing Scheme
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Efficient visual secret sharing scheme for color images
Pattern Recognition
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
Sharing secrets in stego images with authentication
Pattern Recognition
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
DCT-based reversible data hiding scheme
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Sharing a verifiable secret image using two shadows
Pattern Recognition
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Hi-index | 0.00 |
In this paper, we combine absolute moment block truncation coding (AMBTC) and Shamir's secret sharing scheme to propose a verifiable secret sharing scheme. Shares construction is based on the compression codes generated by AMBTC; therefore, the shadow size is about one third of the original secret image. During the shares construction phase, the compression codes generated by AMBTC are first shuffled according to a watermark that is used to verify the authenticity of the reconstructed secret image during the revealing and verifying phase. Then the shuffled compression codes are used to generate the shadows by applying Shamir's scheme. To operate as a cheating prevention function without the need to transmit extra data, the hidden watermark can be a logo or a binary version of the secret image. Comparisons confirm that our proposed scheme offers relatively low computational complexity and smaller shadows than can be achieved with existing schemes offering a cheating prevention function.