Communications of the ACM
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Sharing secrets in stego images with authentication
Pattern Recognition
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Digital Watermarking and Steganography: Fundamentals and Techniques
Digital Watermarking and Steganography: Fundamentals and Techniques
Sharing a verifiable secret image using two shadows
Pattern Recognition
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secret image sharing based on cellular automata and steganography
Pattern Recognition
A high capacity reversible data hiding scheme with edge prediction and difference expansion
Journal of Systems and Software
Invertible secret image sharing with steganography
Pattern Recognition Letters
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper proposes a novel formof reversible data hiding using twomarked images by employing the adaptive coefficient-shifting (ACS) algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-tonoise ratio (PSNR) performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.