2021
DOI: 10.1155/2021/6629726
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

Abstract: With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…Secret sharing was initially introduced by Shamir [1] and Blakley [2]. Many works consider stronger concepts based on the secret sharing, such as hierarchical secret sharing and threshold secret sharing [3][4][5][6][7][8][9][10][11][12][13]. Rabin et al [14] first proposed the concept of robust secret sharing in 1989.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing was initially introduced by Shamir [1] and Blakley [2]. Many works consider stronger concepts based on the secret sharing, such as hierarchical secret sharing and threshold secret sharing [3][4][5][6][7][8][9][10][11][12][13]. Rabin et al [14] first proposed the concept of robust secret sharing in 1989.…”
Section: Introductionmentioning
confidence: 99%