Communications of the ACM
A public verifiable copy protection technique for still images
Journal of Systems and Software
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Secret image sharing with steganography and authentication
Journal of Systems and Software
A new multi-stage secret sharing scheme using one-way function
ACM SIGOPS Operating Systems Review
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
Sharing secrets in stego images with authentication
Pattern Recognition
Enhance the Image Sharing with Steganography and Authentication
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Robust-Fragile Watermarking Scheme for Image Authentication
ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
Progressive sharing for a secret image
Journal of Systems and Software
A novel data hiding scheme based on modulus function
Journal of Systems and Software
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Security and privacy issues in the Portable Document Format
Journal of Systems and Software
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
A secure fragile watermarking scheme based on chaos-and-hamming code
Journal of Systems and Software
A watermarking technique based on one-way hash functions
IEEE Transactions on Consumer Electronics
Reference Sharing Mechanism for Watermark Self-Embedding
IEEE Transactions on Image Processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Image sharing method for gray-level images
Journal of Systems and Software
A reversible data hiding method by histogram shifting in high quality medical images
Journal of Systems and Software
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.