2009
DOI: 10.1179/174313109x459887
|View full text |Cite
|
Sign up to set email alerts
|

A new approach to the secret image sharing with steganography and authentication

Abstract: Steganography can be viewed as cryptography. It includes a variety of secret communication methods that embed the existence of the message and makes it appear invisible. Both of them have been used to protect secret information. In 2004, Lin and Tsai proposed a novel secret image sharing method that was based on the (k, n)-threshold scheme with the additional capabilities of steganography and authentication. They protect a secret image by breaking it into n user-selected ordinary camouflage images. Besides, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…The formula is demonstrated as follows. ( 6 ) In other words, the pixel with gray value Peak indicates that the embedded data bit was 0. If the gray value of current pixel is equal to (Peak+1, Peak+2, Peak+3), it indicates the embedded data bit was (01, 10, 11), respectively.…”
Section: Type I Peak < Zeromentioning
confidence: 99%
See 2 more Smart Citations
“…The formula is demonstrated as follows. ( 6 ) In other words, the pixel with gray value Peak indicates that the embedded data bit was 0. If the gray value of current pixel is equal to (Peak+1, Peak+2, Peak+3), it indicates the embedded data bit was (01, 10, 11), respectively.…”
Section: Type I Peak < Zeromentioning
confidence: 99%
“…Nowadays, reversible data hiding schemes have been proposed by researchers [10] [16] [19] [26] [27]. In general, data hiding techniques are divided into four main kinds of techniques: data compression [1] [7] [25], pixel-value difference expansion (DE) scheme [16] [13], cryptography base scheme [5] [6] [24] and histogram scheme [9][10] [14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Steganography focuses on how to embed data into cover objects, such as video, audio, and digital images. The intent is to embed data by making the smallest possible distortion to the cover object; thus, steganography may draw less attention from attackers than cryptography [23][24][25][26][27]. The most representative method of image-based steganography is least significant bit (LSB) substitution [7][8][9], which embeds the secret data by directly substituting the LSB of the cover pixels in the image with the secret bits.…”
Section: Introductionmentioning
confidence: 99%
“…7,20,33 From the viewpoint of a receiver, on the other hand, a particular design for integrity verification needs to be established to prevent the item from being tampered without proper authorisation. 17,24,25,32 Watermarking is the art of imperceptibly embedding some information into the original work while getting it more or less modified as a result. Because there is a limit to the sensitivity of human beings' sensory organs such as the eyes and the ears, we would experience difficulty telling the subtle differences made to multimedia works.…”
Section: Introductionmentioning
confidence: 99%