IBM Systems Journal
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
Data hiding in images via multiple-based number conversion and lossy compression
IEEE Transactions on Consumer Electronics
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Image Communication
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
Sharing secrets in stego images with authentication
Pattern Recognition
Hiding data in spatial domain images with distortion tolerance
Computer Standards & Interfaces
Visual-based embedding systems with targeted secret disclosures and applications
International Journal of Ad Hoc and Ubiquitous Computing
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Weighted Threshold Secret Image Sharing
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Data protection for land consolidation with distortion tolerable LSB watermarking
WSEAS Transactions on Information Science and Applications
A novel secret image sharing scheme for true-color images with size constraint
Information Sciences: an International Journal
Secret image sharing based on cellular automata and steganography
Pattern Recognition
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
A new sharing secret algorithm in stego images with authentication
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
A new scheme of sharing secrets in stego images with authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Invertible secret image sharing with steganography
Pattern Recognition Letters
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Medical image security and EPR hiding using Shamir's secret sharing scheme
Journal of Systems and Software
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
A hierarchical threshold secret image sharing
Pattern Recognition Letters
User-friendly image sharing in multimedia database using polynomials with different primes
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Secret image sharing with reversible capabilities
International Journal of Internet Technology and Secured Transactions
A protocol to provide assurance of images integrity using memory cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
(r, n)-threshold image secret sharing methods with small shadow images
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Secret image sharing scheme with adaptive authentication strength
Pattern Recognition Letters
Journal of Systems and Software
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
Journal of Systems and Software
XOR-based meaningful visual secret sharing by generalized random grids
Proceedings of the first ACM workshop on Information hiding and multimedia security
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Multimedia Tools and Applications
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
A secret sharing scheme for EBTC using steganography
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pictures, etc., to increase the steganographic effect for the security protection purpose. Furthermore, an image watermarking technique is employed to embed fragile watermark signals into the camouflage images by the use of parity-bit checking, thus providing the capability of authenticating the fidelity of each processed camouflage image, called a stego-image. During the secret image recovery process, each stego-image brought by a participant is first verified for its fidelity by checking the consistency of the parity conditions found in the image pixels. This helps to prevent the participant from incidental or intentional provision of a false or tampered stego-image. The recovery process is stopped if any abnormal stego-image is found. Otherwise, the secret image is recovered from k or more authenticated stego-images. Some effective techniques for handling large images as well as for enhancing security protection are employed, including pixelwise processing of the secret image in secret sharing, use of parts of camouflage images as share components, adoption of prime-number modular arithmetic, truncation of large image pixel values, randomization of parity check policies, etc. Consequently, the proposed scheme as a whole offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. Good experimental results proving the feasibility of the proposed approach are also included.