34
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Steganography based image sharing with reversibility

, &

References

  • Shamir.A, “How to share a secret” Communication, ACM 22(11), 612–613, 1997. doi: 10.1145/359168.359176
  • Blakley, G.R, “Safeguarding cryptographic keys” In: Proc. AFIPS National Computer Conf., vol 48, pp. 313–317, 1979.
  • Naor, M., Shamir, A., “Visual cryptography, advances in cryptology” eurocrypt'94 Springer-Verlag Berlin. pp.1–12, 1995.
  • Thien, C.C., Lin, J.C., “Secret image sharing”. Comput. Graphics 26 (1), 765–770,2002. doi: 10.1016/S0097-8493(02)00131-0
  • Wang, Ran-Zan., Su, C.H., “Secret image sharing with smaller shadow images” Pattern Recognition Lett. 27(6), 551–555, 2006 doi: 10.1016/j.patrec.2005.09.021
  • Wu, Y.S., Thien, C.C., Lin, J.C.,. “Sharing and hiding secret images with size constraint” Pattern Recognition 37 (7), 1377–1385, 2004. doi: 10.1016/j.patcog.2004.01.002
  • Lin,C.C., Tsai, W H., “Secret image sharing with steganography and authentication”. J. Syst. Software 73(3), 405–414, 2004 doi: 10.1016/S0164-1212(03)00239-5
  • Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., “Improvements of image sharing with steganography and authentication”. J. Syst. Software 80 (7), 1070–1076, 2007 doi: 10.1016/j.jss.2006.11.022
  • Chang, C.C., Hsieh, Y.P., Lin, c. h., “Sharing secret in stego images with authentication” Pattern Recognition 41(10),3130–3137, 2008. doi: 10.1016/j.patcog.2008.04.006
  • Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q., “A new image secret sharing scheme to identify cheaters”. Comput. Stand. Interface 31 (1), 252– 257, 2009 doi: 10.1016/j.csi.2007.10.012
  • Lin, P.Y., Lee, J.S., Chang, C.C., “Distortion-free secret image sharing mechanism using modulus operator”. Pattern Recognition 42 (5), 886–895, 2009 doi: 10.1016/j.patcog.2008.09.014
  • Pei-Y.u Lin, Chi-Shiang Chan “Invertible secret image sharing with steganography” Pattern Recognition Lett. 31 1887–1893, 2010. doi: 10.1016/j.patrec.2010.01.019
  • Vora,V.S., Suthar,A.C.,” Analysis of Compressed Image Quality Assessments” International Journal of Advanced Engineering & Application, jan 2010.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.