14
Views
9
CrossRef citations to date
0
Altmetric
Articles

A new approach to the secret image sharing with steganography and authentication

, &
Pages 140-151 | Published online: 18 Jul 2013

REFERENCES

  • Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Process., 1999, 8, 58–68.
  • Shamir, A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
  • Naor, M. and Shamir, A. Visual cryptography. Lect. Notes Comp. Sci., 1995, 950, 1–12.
  • Beimel, A. and Chor, B. Universally ideal secret sharing schemes. IEEE Trans. Inform. Theory, 1994, 40, 786–794.
  • Stinson, D. R. Decomposition constructions for secret- sharing schemes. IEEE Trans. Inform. Theory, 1994, 40, 118–125.
  • Beimel, A. and Chor, B. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory, 1998, 44, 1187–1896.
  • Thien, C. C. and Lin, J. C. Secret image sharing. Comput. Graph. UK, 2002, 26, 765–770.
  • Thien, C. C. and Lin, J. C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 1161–1169.
  • Lin, C. C. and Tsai, W. H. Secret image sharing with steganography and authentication. J. Syst. Softw., 2004, 73, 405–414.
  • Yang, C. N., Chen, T. S., Yu, K. H. and Wang, C. C. Improvements of image sharing with steganography and authentication. J. Syst. Softw., 2007, 80, 1070–1076.
  • Kundur, D. and Hatzinakos, D. Proc. Int. IEEE, 1999, 87, 1167–1180.
  • Wu, D. C. and Tsai, W. H. Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Patt. Recogn. Lett., 1999, 20, 1511–1517.
  • Chan, C. K. and Cheng, L.-M. Hiding data in images by simple lsb substitution. Patt. Recogn., 2004, 37, 469–474.
  • Wu, N. I. and Hwang, M. S. Data hiding: Current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
  • Lin, E. T. and Delp, E. J. A review of fragile image watermarks, Proc. Int. Conf. on Multimedia and security workshop: ACM Multimedia ’99, Orlando, FL, USA, October 1999, ACM, Vol. 1, pp. 25–29.
  • Feng, J. B., Lin I. C., Tsai, C. S. and Chu, Y. P. Reversible watermarking: Current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
  • Stallings, W. Cryptography and network security: Principles and practice, 2003, 3rd edition, (Prentice Hall, Upper Saddle River, NJ).
  • Wang, R. Z. and Su, C. H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2006, 27, 551–555.
  • Weber, A. G. The USC-SIPI image database. Version 5. USC-SIPI report no. 315, University of Southern California, 1997.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.