2010
DOI: 10.4304/jcm.5.1.5-12
|View full text |Cite
|
Sign up to set email alerts
|

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)

Abstract: <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style="font-size: x-small;"><span style="font-family: Times New Roman;"><span style="mso-bidi-font-weight: bold;">A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (<em>t</em>, <em>n</em>)- threshold, we provide a novel sharing scheme in this articl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
39
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 41 publications
(39 citation statements)
references
References 21 publications
0
39
0
Order By: Relevance
“…In other works, Chang et al [4] proposed a novel image sharing scheme using a 16 × 16-sized Sudoku puzzle as a share grid generator. The experiments showed that the shares can be successfully camouflaged in the host image with satisfactory quality.…”
Section: Past Work On Sismentioning
confidence: 99%
See 1 more Smart Citation
“…In other works, Chang et al [4] proposed a novel image sharing scheme using a 16 × 16-sized Sudoku puzzle as a share grid generator. The experiments showed that the shares can be successfully camouflaged in the host image with satisfactory quality.…”
Section: Past Work On Sismentioning
confidence: 99%
“…Secret image sharing (SIS) has been widely studied in the past decade [1,4,16,20,28]. In SIS, the secret image is divided into a number of arbitrary image shares (say k), which are distributed to different users.…”
Section: Introductionmentioning
confidence: 99%
“…Later then, Chang et al [14] and Wang et al [15] also employ Sudoku matrix to secret image sharing topic in order to enhance the security of secret sharing scheme by generating meaningful shadows.…”
Section: Introductionmentioning
confidence: 99%
“…Retrieving requires a pairing of at least two shadow images. This is also done in the work of Chang et al (2010) with lossless recovery of the embedded secret. Yet another extension to the 'shadowSudoku' technique is done by Roshan et al (2009) by extending the work to use pairs from colour images (e g. red and green components) and, use 27 x 27 reference matrix instead of 256 x 256.…”
Section: Sudoku Approach In Security and Data Hidingmentioning
confidence: 99%