Communications of the ACM
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
Hierarchical Threshold Secret Sharing
Journal of Cryptology
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Two secret sharing schemes based on Boolean operations
Pattern Recognition
Friendly progressive visual secret sharing
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Sharing a verifiable secret image using two shadows
Pattern Recognition
Secret image sharing based on cellular automata and steganography
Pattern Recognition
Progressive sharing for a secret image
Journal of Systems and Software
Invertible secret image sharing with steganography
Pattern Recognition Letters
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.10 |
In the traditional secret image sharing schemes, the shadow images are generated by embedding the secret data into the cover image such that a sufficient number of shadow images can cooperate to reconstruct the secret image. In the process of reconstruction, each shadow image plays an equivalent role. However, a general threshold access structure could have other useful properties for the application. In this paper, we consider the problem of secret shadow images with a hierarchical threshold structure, employing Tassa's hierarchical secret sharing to propose a hierarchical threshold secret image sharing scheme. In our scheme, the shadow images are partitioned into several levels, and the threshold access structure is determined by a sequence of threshold requirements. If and only if the shadow images involved satisfy the threshold requirements, the secret image can be reconstructed without distortion.