Data compression: methods and theory
Data compression: methods and theory
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Lower bounds for robust secret sharing schemes
Information Processing Letters
Communications of the ACM
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
SCAN-Based Compression-Encryption-Hiding for Video on Demand
IEEE MultiMedia
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Decomposition constructions for secret-sharing schemes
IEEE Transactions on Information Theory
Spread spectrum image steganography
IEEE Transactions on Image Processing
Two secret sharing schemes based on Boolean operations
Pattern Recognition
A secret image sharing method using integer wavelet transform
EURASIP Journal on Advances in Signal Processing
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
A Matrix-Based Secret Sharing Scheme for Images
CIARP '08 Proceedings of the 13th Iberoamerican congress on Pattern Recognition: Progress in Pattern Recognition, Image Analysis and Applications
A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Error correction of secret images by search order coding
MUSP'09 Proceedings of the 9th WSEAS international conference on Multimedia systems & signal processing
Progressive sharing for a secret image
Journal of Systems and Software
A secret sharing scheme for digital images based on two-dimensional linear cellular automata
IWCIA'08 Proceedings of the 12th international conference on Combinatorial image analysis
Data hiding using run length matching
International Journal of Intelligent Information and Database Systems
A new sharing secret algorithm in stego images with authentication
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Invertible secret image sharing with steganography
Pattern Recognition Letters
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
Comments on matrix-based secret sharing scheme for images
CIARP'10 Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Robust approaches to 3d object secret sharing
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part I
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
(r, n)-threshold image secret sharing methods with small shadow images
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.10 |
Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography. In the method proposed in this study, the difference image of the secret image is encoded using Huffman coding scheme, and the arithmetic calculations of the sharing functions are evaluated in a power-of-two Galois Field GF(2^t). Experiment results show that each generated shadow image in the proposed method is about 40% smaller than that of the method in [Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1), 765-770], which improves its efficiency in storage, transmission, and data hiding.