2007
DOI: 10.1016/j.jss.2006.11.022
|View full text |Cite
|
Sign up to set email alerts
|

Improvements of image sharing with steganography and authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
168
1
3

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 268 publications
(175 citation statements)
references
References 9 publications
0
168
1
3
Order By: Relevance
“…Yang et al [23] proposed a solution based on Galois Field GF (2 8 ), where the basic polynomial is changed into Equation (2). In Yang and coworkers' scheme, all computations of integers are replaced with operations of polynomials in GF (2 8 ), and there are 256 polynomials in corresponding to integers from 0 to 255.…”
Section: Psis With Lossless Recoverymentioning
confidence: 99%
See 2 more Smart Citations
“…Yang et al [23] proposed a solution based on Galois Field GF (2 8 ), where the basic polynomial is changed into Equation (2). In Yang and coworkers' scheme, all computations of integers are replaced with operations of polynomials in GF (2 8 ), and there are 256 polynomials in corresponding to integers from 0 to 255.…”
Section: Psis With Lossless Recoverymentioning
confidence: 99%
“…Herein, we provide some comparisons between our proposed scheme and other related typical schemes [4,6,23,24].…”
Section: Comparisons With Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this technique, offered a scheme to get better authentication capability, thus avert lying participants from fraud. The proposed scheme in addition defines the provision of embedded bits to get better features of stego-image [5].…”
Section: Literature Reviewmentioning
confidence: 99%
“…To enlarge the hiding storage, the idea of a secret sharing scheme, namely, the (t, n) threshold scheme invented by Shamir [16], was employed and extended to image hiding and authentication [17][18][19][20][21][22][23]. Moreover, to fully recover the host image and losslessly extract the hidden message, researchers [24,25] presented reversible secret image sharing with steganography.…”
Section: Input Blockmentioning
confidence: 99%