2020
DOI: 10.3390/s20133802
|View full text |Cite
|
Sign up to set email alerts
|

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection

Abstract: Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants. Without the complete set of shadows shared among all participants, the secret could not be deciphered. This technique may serve as a crucial means for protecting private data in massive Internet of things applications. This can be realized by distributing the stego image shadows to different devices on the Internet so that only the ones wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 23 publications
1
9
0
Order By: Relevance
“…However, the average detection rate of the authentication mechanism with the three shadow images provided by Li et al's [18] scheme can only reach 98%. In addition, the average detection rate of the authentication mechanism with two shadow images provided in this paper has reached 98%, this is the same result as the scheme by Gao et al [30], while the average detection rate of the schemes of Liu et al [28] and Chang et al [29] can only reach 50% and 43% respectively.…”
Section: B Authentication Abilitysupporting
confidence: 80%
See 2 more Smart Citations
“…However, the average detection rate of the authentication mechanism with the three shadow images provided by Li et al's [18] scheme can only reach 98%. In addition, the average detection rate of the authentication mechanism with two shadow images provided in this paper has reached 98%, this is the same result as the scheme by Gao et al [30], while the average detection rate of the schemes of Liu et al [28] and Chang et al [29] can only reach 50% and 43% respectively.…”
Section: B Authentication Abilitysupporting
confidence: 80%
“…Similar to Liu et al's scheme, the SIS scheme proposed by Chang et al [29] also embeds the secret data in two different original images and generated two meaningful shadow images with the help of the maze matrix (see Fig. 2).…”
Section: B a Maze Matrix-based Secret Image Sharing Scheme [29]mentioning
confidence: 99%
See 1 more Smart Citation
“…By analyzing the differences between shares, camouflage can easily be detected. In 2019 and 2020, SIS schemes using different cover images were proposed [34] [35]. However, these schemes are irreversible: the cover images cannot be reconstructed after extraction of the secret data.…”
Section: Introductionmentioning
confidence: 99%
“…A secret image sharing solution based on a new maze matrix is presented in [ 7 ]. A pair of different cover images are utilized to carry secret data, and a pair of shadow images are formed following the supervision of the maze matrix.…”
mentioning
confidence: 99%