2013
DOI: 10.1016/j.jss.2012.09.027
|View full text |Cite
|
Sign up to set email alerts
|

Invertible secret image sharing for gray level and dithered cover images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(31 citation statements)
references
References 15 publications
0
30
0
Order By: Relevance
“…To demonstrate the comparison of the sharable secret capacity between the related secret-sharing schemes [Lin and Tsai 2004;Yang et al 2007;Chang et al 2008;Ulutas et al 2011;Eslami and Ahmadabadi 2011;Chen 2013;Ulutas et al 2013] with the proposed DVSS, Figure 7 shows the maximum sharable secret payload under a different setting of t. The secret payload of other schemes [Lin and Tsai 2004;Yang et al 2007] is fixed to H × W/4 pixels. The secret payload is H × W/4 × t digits with 251-ary notational system for the schemes of Chang et al [2008] and Ulutas et al [2011].…”
Section: Simulation Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…To demonstrate the comparison of the sharable secret capacity between the related secret-sharing schemes [Lin and Tsai 2004;Yang et al 2007;Chang et al 2008;Ulutas et al 2011;Eslami and Ahmadabadi 2011;Chen 2013;Ulutas et al 2013] with the proposed DVSS, Figure 7 shows the maximum sharable secret payload under a different setting of t. The secret payload of other schemes [Lin and Tsai 2004;Yang et al 2007] is fixed to H × W/4 pixels. The secret payload is H × W/4 × t digits with 251-ary notational system for the schemes of Chang et al [2008] and Ulutas et al [2011].…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…The secret capacity of Chen's scheme [Chen 2013] is fixed to 2 × H × W pixels and can achieve better payload than that achieved in related works. By increasing the setting value of t, we can observe that DVSS can share significantly more secret capacity than the related schemes [Lin and Tsai 2004;Yang et al 2007;Chang et al 2008;Ulutas et al 2011;Eslami and Ahmadabadi 2011;Chen 2013;Ulutas et al 2013]. In addition, the sharing scheme [Chen 2013] is incapable of satisfying the steganography purpose for the secret shadows and these schemes [Chen 2013;Ulutas et al 2013] are incapable of achieving cheater detection.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Compared with (Yang et al [19]; Lin et al, [9]; Ulutas et al [16]), which can only share one secret image during one share process, the new scheme provides a method to distribute multiple secret images with good performance. In the new scheme, m secret images can be shared in the way that one participant holds just one shadow image, while m×n shadow images are needed for a non-multisecret image sharing scheme.…”
Section: Discussionmentioning
confidence: 99%
“…In 2009, the modulus operator was employed by Lin et al [9] such that the shadow images are meaningful with satisfactory quality and both the retrieved secret image and the reconstructed cover image are lossless. In 2013, Ulutas et al [16] utilized Exploiting Modification Direction (EMD) and modulus operator to design an invertible secret image sharing scheme, where the quality of the shadow images is highly improved for both gray level and binary cover images. In 2014, a novel hierarchical threshold secret image sharing scheme was proposed by Pakniat et al [12].…”
mentioning
confidence: 99%
“…These schemes include sharing a secret image among host images [8,14,20], sharing with authentication [25], 2 Literature review Section 2.1 provides a review of the work of Chen and Wu [5], who used Boolean operations to share n-1 secret images among n shared images. Chen and Wu increased the sharing capacity and shared image security [6], as described in Section 2.2.…”
Section: Introductionmentioning
confidence: 99%