Improvements in geometry-based secret image sharing approach with steganography (Q966240): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q58648902, #quickstatements; #temporary_batch_1706826133308
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2093394708 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distortion-free secret image sharing mechanism using modulus operator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sharing secrets in stego images with authentication / rank
 
Normal rank

Latest revision as of 17:54, 2 July 2024

scientific article
Language Label Description Also known as
English
Improvements in geometry-based secret image sharing approach with steganography
scientific article

    Statements

    Improvements in geometry-based secret image sharing approach with steganography (English)
    0 references
    0 references
    0 references
    0 references
    23 April 2010
    0 references
    Summary: Protection of the sensitive data is an important issue because of the fast development of applications that need exchange of the secret information over the Internet. Secret sharing is an idea proposed by Shamir and Blakley separately with different implementations in 1979. Lin and Tsai proposed a method that uses Steganography to create meaningful shares by using Shamir's secret sharing scheme in 2004. In recent years, researchers work to remove some of the weaknesses of this method. However, all of these methods need cover images four times bigger than the secret image. This arises two problems: increased storage and bandwidth need for shares. We used cover images with the same size as the secret image by using both Blakley's secret sharing approach and Steganography. Therefore, we achieved reduced storage and transmission bandwidth for shares. Besides, the proposed method creates meaningful shares by using Steganography instead of noise-like shares, different from other studies that use Blakley's approach.
    0 references

    Identifiers