Sharing secrets in stego images with authentication
From MaRDI portal
Publication:936437
DOI10.1016/J.PATCOG.2008.04.006zbMATH Open1147.68503OpenAlexW2042901705MaRDI QIDQ936437FDOQ936437
Authors: Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin
Publication date: 13 August 2008
Published in: Pattern Recognition (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.patcog.2008.04.006
Recommendations
- Secret image sharing based on cellular automata and steganography
- A comment on ``Sharing secrets in stego images with authentication
- Image sharing with steganography and authentication
- Authors reply ``Sharing secrets in stego images with authentication
- Steganography based image sharing with reversibility
Data encryption (aspects in computer science) (68P25) Computing methodologies for image processing (68U10) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Hiding data in images by simple LSB substitution
- How to share a secret
- Title not available (Why is that?)
- A steganographic method based upon JPEG and quantization table modification
- A steganographic method for images by pixel-value differencing
- Efficient visual secret sharing scheme for color images
- Steganography of capacity required using modulo operator for embedding secret image
- Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
- A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function.
- Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
- Image hiding by optimal LSB substitution and genetic algorithm
Cited In (19)
- Title not available (Why is that?)
- Improvements in geometry-based secret image sharing approach with steganography
- A compressed secret image sharing method with shadow image verification capability
- Secret image sharing based on cellular automata and steganography
- A comment on ``Sharing secrets in stego images with authentication
- Authors reply ``Sharing secrets in stego images with authentication
- Image inpainting-based behavior image secret sharing
- Sharing a verifiable secret image using two shadows
- A Lossless Linear Algebraic Secret Image Sharing Scheme
- A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction
- Multiparty verification in image secret sharing
- Secret image sharing scheme with threshold changeable capability
- MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
- Review on spatial domain image steganography techniques
- Reversible data hiding based on Shamir's secret sharing for color images over cloud
- Steganography based image sharing with reversibility
- Secret sharing with multi-cover adaptive steganography
- Fake and dishonest participant location scheme in secret image sharing
- Security protection using two different image shadows with authentication
This page was built for publication: Sharing secrets in stego images with authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q936437)