Communications of the ACM
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
IEEE Transactions on Information Theory
A modular approach to key safeguarding
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In conventional image information sharing schemes, there exist many disadvantages such as the limited ability in resisting attacks, the low utilization of sub-information and the lossless restored secret image. To address these problems, a novel DCT Based multi-channel image information sharing scheme in resisting JPEG lossy compression attack is proposed. In the source end, the distributed sub-informations of secret image are generated by Lagrange interpolation and certificated by avalanche scrambling transformation. The produced distributed sub-informations and authentication informations are embedded to images carriers by mean value adjusting method in DCT domain. After being received in the terminal end, all received sub-information are utilized to reconstruct the hided secret image in block. The experimental results show the proposed scheme can resist JPEG lossy compression, copping, erasing and other attacks effectively by comparing the conventional methods.