2009
DOI: 10.1016/j.csi.2007.10.012
|View full text |Cite
|
Sign up to set email alerts
|

A new image secret sharing scheme to identify cheaters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(44 citation statements)
references
References 6 publications
0
44
0
Order By: Relevance
“…Generally speaking, the research studies related to information hiding can be categorized into two schools -the spatial domain [1][2][3][4][5][6] and the frequency domain [7][8][9][10][11][12]. The spatial domain methods employ the property where a tiny change of pixels cannot be detected by the human eye; therefore, secret information is embedded by directly modifying the pixel's gray value.…”
Section: Introductionmentioning
confidence: 99%
“…Generally speaking, the research studies related to information hiding can be categorized into two schools -the spatial domain [1][2][3][4][5][6] and the frequency domain [7][8][9][10][11][12]. The spatial domain methods employ the property where a tiny change of pixels cannot be detected by the human eye; therefore, secret information is embedded by directly modifying the pixel's gray value.…”
Section: Introductionmentioning
confidence: 99%
“…The generation of X i j is the same as in method [8], while the steps generating R i j are nearly the same as those generating X i j in method [8] with different step 1 and step 2. In step 1 and step 2 of the proposed method, R i j is computed by one way coupled map lattice [5] …”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Image encryption phase based on Shamir's (k, n)-threshold method [1] has been studied [1][2][3][4][5][6], which is known as secret image sharing. Any k of the n shadow images generated by those methods can reconstruct the original secret image.…”
Section: Introductionmentioning
confidence: 99%
“…Harn and Lin [15] proposed cheater identification method for Shamir's scheme. Zhao et al [16] proposed new lossless secret sharing scheme to identify cheaters in image secret sharing. S. Patil and P. Deshmukh [17] proposed new approach to identify cheaters in matrix projection based secret sharing.…”
Section: Cheater Identificationmentioning
confidence: 99%