The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2010
DOI: 10.1016/j.patrec.2010.01.019
|View full text |Cite
|
Sign up to set email alerts
|

Invertible secret image sharing with steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
115
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 122 publications
(115 citation statements)
references
References 22 publications
0
115
0
Order By: Relevance
“…Figure 8 shows pure capacity, defined by capacity minus extra storage. The proposed scheme performs almost as well as the Lin and Chan method [13]. The proposed scheme has nearly the same capacity as the other two methods but preserves better covered image quality with a higher PSNR.…”
Section: Discussionmentioning
confidence: 70%
See 2 more Smart Citations
“…Figure 8 shows pure capacity, defined by capacity minus extra storage. The proposed scheme performs almost as well as the Lin and Chan method [13]. The proposed scheme has nearly the same capacity as the other two methods but preserves better covered image quality with a higher PSNR.…”
Section: Discussionmentioning
confidence: 70%
“…This section compares the proposed scheme with two well-known invertible secret image sharing schemes 12,13 . The three schemes preserve the following properties (also shown in Table 4):…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego-images must be able to be reverted to the original cover image [3]. It achieves the transformation by mary notational system and share these transformation by (t,n) threshold scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The small shadow size is a good property in practice. From then on, plenty of PSIS schemes based on Thien-and-Lin's scheme have been emerged to achieve more interesting performances, such as meaningful shares [7][8][9], two-in-one recovery [10,11] and shares with different priorities [12][13][14][15][16][17]. However, there exists a disadvantage in Thien-and-Lin's PSIS scheme that it cannot actually recover a lossless secret image, which is described in detail in Section 2.…”
Section: Introductionmentioning
confidence: 99%