IBM Systems Journal
Communications of the ACM
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Secret image sharing with steganography and authentication
Journal of Systems and Software
Blind image data hiding based on self reference
Pattern Recognition Letters
A lossless data hiding scheme based on three-pixel block differences
Pattern Recognition
A local Tchebichef moments-based robust image watermarking
Signal Processing
Reversible data hiding exploiting spatial correlation between sub-sampled images
Pattern Recognition
A new approach to covert communication via PDF files
Signal Processing
Reversible image watermarking using interpolation technique
IEEE Transactions on Information Forensics and Security
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Robust template matching for affine resistant image watermarks
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Wavelet tree quantization for copyright protection watermarking
IEEE Transactions on Image Processing
Lossless Data Embedding Using Generalized Statistical Quantity Histogram
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Image Processing
Hi-index | 0.08 |
A new data hiding method via PNG images based on Shamir's (k, n)-threshold secret sharing scheme is proposed. The coefficients of the polynomial used by the Shamir's method are taken as carriers to carry given data. The data to be hidden then are transformed into partial shares and embedded into the alpha-channel plane of a cover PNG image. Undesired white noise created in the resulting stego-image is removed by skillfully mapping the computed share values into suitable ranges in the embedding process. An important application of the proposed method to color image authentication is also proposed, with detailed authentication algorithms for PNG images presented. Compared with existing methods, the proposed image authentication method possesses the merits of losslessness during image authentication, high sensitivity to image alterations, good tampering localization capability, and very low false acceptance and rejection ratios. Experimental results proving the effectiveness of the proposed methods are also included.