Communications of the ACM
Sharing multiple secrets in digital images
Journal of Systems and Software
Secret image sharing with steganography and authentication
Journal of Systems and Software
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
Sharing secrets in stego images with authentication
Pattern Recognition
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Invertible secret image sharing with steganography
Pattern Recognition Letters
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Many traditional steganography methods do not disperse and hide secret data smoothly over all the capacity of cover images. Rather, they severely modify part of the cover image(s) to embed secret data, which results in stego images that have poor visual quality. In addition, there are still some secret image-sharing approaches that cannot reveal the secret image losslessly without pixel expansion or extra storage or restore distortion-free cover image(s) if they use steganography. In this paper, a novel scheme, which is based on Shamir's (t, n)-threshold scheme (1979) and Galois Field GF(28) and uses dynamic embedding and least significant bit construction, is proposed to solve the issues mentioned above. Our experimental results showed that the dynamic embedding performance in our scheme was satisfactory and that both the secret image and the cover image can be restored losslessly without pixel expansion or extra storage. Copyright © 2012 John Wiley & Sons, Ltd.