A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction
DOI10.1155/2015/849768zbMATH Open1395.94038OpenAlexW1970938123WikidataQ59119661 ScholiaQ59119661MaRDI QIDQ1666751FDOQ1666751
Li-Feng Yuan, Wei-Tong Hu, Mingchu Li, Cheng Guo
Publication date: 27 August 2018
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2015/849768
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to share a secret
- On the contrast in visual cryptography schemes
- New Results on Visual Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Contrast Optimal Threshold Visual Cryptography Schemes
- Colored visual cryptography scheme based on additive color mixing
- Invertible cellular automata: A review
- A verifiable multi-secret sharing scheme based on cellular automata
- Distortion-free secret image sharing mechanism using modulus operator
- Sharing secrets in stego images with authentication
- Title not available (Why is that?)
- Visual cryptography schemes with optimal pixel expansion
- A secret sharing scheme based on cellular automata
- Visual cryptography for gray-level images by dithering techniques
- Secret image hiding and sharing based on the \((t,n)\)-threshold
Cited In (4)
- Cellular Automata Based Image Authentication Scheme Using Extended Visual Cryptography
- Welch sets for random generation and representation of reversible one-dimensional cellular automata
- A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm
- Secret image sharing based on cellular automata and steganography
This page was built for publication: A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1666751)