Communications of the ACM
Secret image sharing with steganography and authentication
Journal of Systems and Software
Image Communication
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Sharing secrets in stego images with authentication
Pattern Recognition
A Matrix-Based Secret Sharing Scheme for Images
CIARP '08 Proceedings of the 13th Iberoamerican congress on Pattern Recognition: Progress in Pattern Recognition, Image Analysis and Applications
Weighted Threshold Secret Image Sharing
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Comments on matrix-based secret sharing scheme for images
CIARP'10 Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
In (k, n) secret image sharing (SIS), a scheme encrypts a secret image into n shadow images. Any k or more shadow images can be collaborated together to reveal the secret image. Most of the previous SIS schemes don't distinguish the importance of shadows. However, in some application environments, some participants are accorded special privileges due to their status or importance. Thus, some shadows may be more important than others. In this paper, we consider the (t, s, k, n) essential SIS (ESIS) scheme. All n shadows are classified into s essential shadows and (n-s) non-essential shadows. When reconstructing the secret image, the (t, s, k, n)-ESIS scheme needs k shadows, which should include at least t essential shadows.