Communications of the ACM
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Two secret sharing schemes based on Boolean operations
Pattern Recognition
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Sharing secrets in stego images with authentication
Pattern Recognition
Perturbation Hiding and the Batch Steganography Problem
Information Hiding
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
A local Tchebichef moments-based robust image watermarking
Signal Processing
Reversibility improved lossless data hiding
Signal Processing
Step construction of visual cryptography schemes
IEEE Transactions on Information Forensics and Security
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
Local histogram based geometric invariant image watermarking
Signal Processing
Invertible secret image sharing with steganography
Pattern Recognition Letters
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences: an International Journal
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
A compact covering method to exploit embedding capacity for matrix encoding
Information Sciences: an International Journal
Information Sciences: an International Journal
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Optimizing least-significant-bit substitution using cat swarm optimization strategy
Information Sciences: an International Journal
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Color Extended Visual Cryptography Using Error Diffusion
IEEE Transactions on Image Processing
Lossless Data Embedding Using Generalized Statistical Quantity Histogram
IEEE Transactions on Circuits and Systems for Video Technology
Embedded Extended Visual Cryptography Schemes
IEEE Transactions on Information Forensics and Security
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Block-based progressive visual secret sharing
Information Sciences: an International Journal
Data hiding in scrambled images: A new double layer security data hiding technique
Computers and Electrical Engineering
Hi-index | 0.07 |
More and more studies have been dedicated to investigating secret sharing with steganography. Unfortunately, no previous work has ever reported its capability to resist steganalysis. In this paper, we pose the multi-cover adaptive steganography problem. Two secret sharing methods for natural images based on multi-cover adaptive steganography have been proposed. The secret information is adaptively shared into textured regions of covers by a spatial +/-1 operation. In comparison to previous secret sharing methods, each of the proposed methods uses a simple share-constructing operation and each has lossless secret reconstruction and high quality shares. More importantly, the proposed methods are more secure in terms of resistance against state-of-the-art steganalysis techniques. In comparison to previous steganographic methods, the proposed methods hide secret bits among textured regions with different covers and are thus difficult to detect. Moreover, the proposed methods can be used to adaptively embed location-sensitive secrets (e.g., secret images) and require no stego key for extracting the encrypted message. These results also have significance in individual cover steganography. The experimental results show the effectiveness of the proposed methods.