Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
Communications of the ACM
Secret image sharing with steganography and authentication
Journal of Systems and Software
A new multi-secret images sharing scheme using Largrange's interpolation
Journal of Systems and Software
IEEE Transactions on Consumer Electronics
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Sharing secrets in stego images with authentication
Pattern Recognition
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
Authors reply 'Sharing secrets in stego images with authentication'
Pattern Recognition
Sharing a verifiable secret image using two shadows
Pattern Recognition
Secret image sharing based on cellular automata and steganography
Pattern Recognition
A new sharing secret algorithm in stego images with authentication
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
A new scheme of sharing secrets in stego images with authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Invertible secret image sharing with steganography
Pattern Recognition Letters
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
A hierarchical threshold secret image sharing
Pattern Recognition Letters
Secret image sharing with reversible capabilities
International Journal of Internet Technology and Secured Transactions
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
Reversible secret image sharing with steganography and dynamic embedding
Security and Communication Networks
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Secret image sharing scheme with adaptive authentication strength
Pattern Recognition Letters
Invertible secret image sharing for gray level and dithered cover images
Journal of Systems and Software
Journal of Systems and Software
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, dishonest participants can easily manipulate the stego-image for successful authentication but cannot recover the secret image, i.e., compromise the steganography. In this paper, we present a scheme to improve authentication ability that prevents dishonest participants from cheating. The proposed scheme also defines the arrangement of embedded bits to improve the quality of stego-image. Furthermore, by means of the Galois Field GF(2^8), we improve the scheme to a lossless version without additional pixels.