32
Views
3
CrossRef citations to date
0
Altmetric
Original Research Paper

Secret image sharing with enhanced visual quality and authentication mechanism

, &
Pages 154-165 | Accepted 03 Aug 2010, Published online: 12 Nov 2013

References

  • Shamir A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
  • Blakley GR. Safeguarding cryptographic keys. Proc. Natl Comput. Conf., 1979, 48, 313–317.
  • Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. Inf. Theory, 1983, 29, 208–210.
  • Mignotte M. How to share a secret. Lect. Notes Comput. Sci., 1983, 149, 371–375.
  • Thien C-C, Lin J-C. Secret image sharing. Comput. Graph., 2002, 26, 765–770.
  • Wang R-Z, Su C-H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2006, 27, 551–555.
  • Chang C-C, Lin C-C, Lin C-H, Chen Y-H. A novel secret image sharing scheme in color images using small shadow images. Inf. Sci., 2008, 178, 2433–2447.
  • Zhao R, Zhao J-J, Dai F, Zhao F-Q. A new image secret sharing scheme to identify cheaters. Comput. Stand. Interf., 2009, 31, 252–257.
  • Lin P-Y, Lee J-S, Chang C-C. ‘Distortion-free secret image sharing mechanism using modulus operator’, Patt. Recogn., 2009, 42, 886–895.
  • Thien C-C, Lin J-C. An image sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol., 2003, 3, 1161–1169.
  • Lin C-C, Tsai W-H. Secret image sharing with steganography and authentication. J. Syst. Software, 2004, 73, 405–414.
  • Yang C-N, Chen T-S, Yu KH, Wang C-C. Improvements of image sharing with steganography and authentication. J. Syst. Software, 2007, 80, 1070–1076.
  • Chang C-C, Hsieh Y-P, Lin C-H. Sharing secrets in stego images with authentication. Patt. Recogn., 2008, 41, 3130–3137.
  • Wu C-C, Hwang M-S, Kao S-J. A new approach to the secret image sharing with steganography and authentication. Imag. Sci. J., 2009, 57, 140–151.
  • Wu C-C, Kao S-J, Kuo W-C, Hwang M-S. Reversible secret image sharing based on Shamir’s scheme, Proc. Int. Conf. on Intelligent information hiding and multimedia signal processing: IIHMSP 2009, Kyoto, Japan, September 2009, IEEE, pp. 1014–1017.
  • Chen C-C, Fu W-Y. A geometry based secret image sharing approach. J. Inf. Sci. Eng., 2008, 24, 1567–1577.
  • Tso H-K. Sharing secret images using Blakley’s concept. Opt. Eng., 2008, 47, 077001.
  • Ulutas M, Nabiyev V, Ulutas G. Improvements in geometry-based secret ımage sharing approach with steganography. Math. Probl. Eng., 2009, 2009, to be published.
  • Chen C-C, Chang C-C. Secret image sharing using quadratic residues. Intell. Inf. Hiding Multimedia Signal Process., 2007, 1, 515–518.
  • Meher PK, Patra JC. A new approach to secure distributed storage, sharing and dissemination of digital image, Proc. IEEE Int. Symp. on Circuits and systems: ISCAS 2006, Island of Kos, Greece, May 2006, IEEE, pp. 373–376.
  • Shyu SJ, Chen Y. Threshold secret image sharing by Chinese remainder theorem, Proc. 3rd IEEE Asia-Pacific Services Computing Conf.: APSCC 2008, Yilan, Taiwan, December 2008, IEEE, pp. 1332–1337.
  • Yang C-N, Ciou C-B. A comment on sharing secrets in stegoimages with authentication Patt. Recogn., 2009, 42, 1615–1619.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.