How to share a secret with cheaters
Journal of Cryptology
Communications of the ACM
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Adaptive lossless steganographic scheme with centralized difference expansion
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Secret image sharing based on cellular automata and steganography
Pattern Recognition
A lossless robust data hiding scheme
Pattern Recognition
Generic lossless visible watermarking: a new approach
IEEE Transactions on Image Processing
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Secret Sharing With Public Reconstruction
IEEE Transactions on Information Theory
Hi-index | 0.00 |
For digital communication, distributed storage and management of media content over system holders is a critical issue. In this article, an efficient verifiable sharing scheme is proposed that can satisfy the significant essentials of distribution sharing and can achieve the lossless property of the host media. Verifiability allows holders to detect and identify the counterfeited shadows during cooperation in order to prevent cheaters. Only authorized holders can reveal the lossless shared content and then reconstruct the original host image. The shared media capacity is adjustable and proportional to the increase of t. The more distributed holders, the larger the shared media capacity. Moreover, the ability to reconstruct the image preserves the fidelity of valuable host media, such as military and medical images. According to the results, the proposed approach can achieve superior performance to that of related sharing schemes in order to effectively provide distributed media management and storage.