The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2009
DOI: 10.1016/j.patcog.2008.09.014
|View full text |Cite
|
Sign up to set email alerts
|

Distortion-free secret image sharing mechanism using modulus operator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(48 citation statements)
references
References 13 publications
0
48
0
Order By: Relevance
“…To evaluate our scheme's performance, this subsection compares our scheme with various approaches [11,13,14,20,22,24]. Since the PSNR value of Yang and Tsai [14] is better than those of Zeng et al [12] and Yang and Hu [15] when the payload approaches 1 bpp, the performance comparison does not include both methods.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To evaluate our scheme's performance, this subsection compares our scheme with various approaches [11,13,14,20,22,24]. Since the PSNR value of Yang and Tsai [14] is better than those of Zeng et al [12] and Yang and Hu [15] when the payload approaches 1 bpp, the performance comparison does not include both methods.…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, to fully recover the host image and losslessly extract the hidden message, researchers [24,25] presented reversible secret image sharing with steganography. However, a (t, n) threshold of secret image sharing with steganography often requires t ≤ n and n ≥ 3.…”
Section: Input Blockmentioning
confidence: 99%
“…This section compares the proposed scheme with two well-known invertible secret image sharing schemes 12,13 . The three schemes preserve the following properties (also shown in Table 4):…”
Section: Discussionmentioning
confidence: 99%
“…Lin and Tsai 11 presented steganography and parity check techniques to share and authenticate images. Lin et al 12 used pixels in secret and cover images to apply to the Shamir sharing function for pixel calculation of shared images. Lin and Chan 13 improved this technique 12 to increase the embedded capacity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation