2016
DOI: 10.1016/j.jvcir.2016.03.012
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of TiOISSS with meaningful shadows and with an additional authentication image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…The scheme proposed is compared with schemes in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] with respect to properties such as intelligible shares, authentication for cheating prevention, number of secret images shared, restriction on v and z, and lossless recovery of secret images as shown in Table 3. A number of secret images shared, for schemes in [12,14,18], are written as 'Multiple'.…”
Section: Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…The scheme proposed is compared with schemes in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] with respect to properties such as intelligible shares, authentication for cheating prevention, number of secret images shared, restriction on v and z, and lossless recovery of secret images as shown in Table 3. A number of secret images shared, for schemes in [12,14,18], are written as 'Multiple'.…”
Section: Comparisonmentioning
confidence: 99%
“…Among these, only Srividhya et al. [9] and Sridhar and Sudha [12] support authentication of intelligible shares with respect to a malicious attacker from outside.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…But this scheme had security limitations as it created noisy shares. This scheme was improved by Srividhya et al [30] by creating meaningful shares and enhancing its security by sharing an authentication image along with the secret image. The visual quality of the recovered image was improved due to usage of adaptive halftoning.…”
Section: Related Workmentioning
confidence: 99%
“…The existing watermarking based authentication schemes [6,25,34,37,41] modify the original host image by embedding watermark into it, thereby resulting in the image quality degradation. Hence, in the past decade VC based authentication schemes [3,5,8,13,30,36,39] have gained a lot of attention as these schemes do not embed watermark into the host original image. The shares are constructed from the host image, and then these shares along with the authentication data or watermark are embedded into some other cover images which are transferred through the communication channels.…”
Section: Introductionmentioning
confidence: 99%