Chinese remainder theorem: applications in computing, coding, cryptography
Chinese remainder theorem: applications in computing, coding, cryptography
Communications of the ACM
Image and Video Compression Standards: Algorithms and Architectures
Image and Video Compression Standards: Algorithms and Architectures
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Sharing multiple secrets in visual cryptography
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
Visual secret sharing for multiple secrets
Pattern Recognition
Invertible secret image sharing with steganography
Pattern Recognition Letters
IEEE Transactions on Multimedia
A modular approach to key safeguarding
IEEE Transactions on Information Theory
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In traditional secret sharing schemes a secret is shared within a group of users such that a subset of the group must come together and collaborate in order to reconstruct the secret. In general image secret sharing schemes, the cover image, within which a secret share is hidden, cannot be restored back to its original form. This loss is unaffordable in situations dealing with sensitive images, for example, medical, military and legal industries. In this paper we propose a secret image sharing scheme by which after secret reconstruction, the cover image can also be restored back to its original form without any bit loss. In the proposed scheme, the secret share generation and secret image reconstruction are based on the concept of the Chinese Remainder Theorem. Hiding of the secret image shares and the cover image retrieval are done utilizing a Generalized Least Significant Bit Replacement method. Implementation results show that the proposed method compares favorably to a recent method for lossless secret sharing.