Visual cryptography for general access structures
Information and Computation
Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
Communications of the ACM
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels
Designs, Codes and Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
Sharing multiple secrets in digital images
Journal of Systems and Software
Secret image sharing with steganography and authentication
Journal of Systems and Software
A cost-effective encryption scheme for color images
Real-Time Imaging - Special issue on multi-dimensional image processing
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Journal of Visual Communication and Image Representation
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
(r, n)-threshold image secret sharing methods with small shadow images
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
In this paper, we propose an innovative scheme, namely the scalable secret image sharing scheme, for sharing an image O among n participants such that the clarity of the reconstructed image (i.e., the amount of information therein) scales with proportion with the number of the participants. The proposed scheme encodes O into n shadow images that exhibit the following features: (a) each shadow image reveals no information about O, (b) each shadow image is only half the size of O, (c) any k (2=