Sharing secrets in stego images with authentication
Pattern Recognition
A new sharing secret algorithm in stego images with authentication
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Scalable user-friendly image sharing
Journal of Visual Communication and Image Representation
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
A general (k, n) scalable secret image sharing scheme with the smooth scalability
Journal of Systems and Software
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Hi-index | 0.00 |
Recently, Thien and Lin proposed a user-friendly (k, n)-threshold scheme which employs Lagrange interpolation to produce shadow images representing a shrunken version of the original image. In this paper, we introduce a new framework which uses more (k - 1)-degree polynomials with different primes to enhance the functionality of the user-friendly (k, n)-threshold framework and obtain more effective performance for large k. Since the proposed framework significantly reduces reconstruction errors compared to the previously published user-friendly schemes, it is suitable for modern visual communication applications where features such as distributed trust, secure transmission and storage, fault tolerance, and high-quality image reconstruction are required. © 2007 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 17, 40–47, 2007