Communications of the ACM
Sharing multiple secrets in digital images
Journal of Systems and Software
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
A new multi-secret images sharing scheme using Largrange's interpolation
Journal of Systems and Software
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Hierarchical Threshold Secret Sharing
Journal of Cryptology
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Two secret sharing schemes based on Boolean operations
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
Visual secret sharing for multiple secrets
Pattern Recognition
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Invertible secret image sharing with steganography
Pattern Recognition Letters
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
Journal of Network and Computer Applications
Hi-index | 0.10 |
In this paper, we consider the problem of secret image sharing in groups with multi-threshold access structure. In such a case, multiple secret images can be shared among a group of participants, and each secret image is associated with a (potentially different) access structure. We employ Hsu et al.'s multi-secret sharing scheme based on monotone span programs (MSP) to propose a multi-threshold secret image sharing scheme. In our scheme, according to the real situation, we pre-defined the corresponding access structures. Using Hsu et al.'s method, we can achieve shadow data from multiple secret images according to these access structures. Then, we utilize the least significant bits (LSB) replacement to embed these shadow data into the cover image. Each secret image can be reconstructed losslessly by collecting a corresponding qualified subset of the shadow images. The experimental results demonstrate that the proposed scheme is feasible and efficient.