2022
DOI: 10.3390/math10183241
|View full text |Cite
|
Sign up to set email alerts
|

Meaningful Secret Image Sharing with Uniform Image Quality

Abstract: In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image. Meaningful shadows can reduce the suspicion of attackers in transmission and facilitate shadow management. Previous MSIS schemes always include pixel expansion, and cross-interference from different shadows may exist when cover images are extremely unnatural images with large black and white blocks. In this article, we propose an MSIS with uniform image qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…A bitwise XOR operation is conducted on the essential shadows E₁, E₂, …, Eₜ, resulting in the generation of the cover shadow (CS). (6). A bitwise XOR operation is executed between the cover shadow (CS) and each of the initial shadows ISt₊₁, IS₂, …, ISₙ, yielding the n − t non-essential shadows NE₁, NE₂, …, NEₙ₋ₜ, respectively.…”
Section: A Methods For (T K N)-threshold Preview-able Essential Secre...mentioning
confidence: 99%
See 1 more Smart Citation
“…A bitwise XOR operation is conducted on the essential shadows E₁, E₂, …, Eₜ, resulting in the generation of the cover shadow (CS). (6). A bitwise XOR operation is executed between the cover shadow (CS) and each of the initial shadows ISt₊₁, IS₂, …, ISₙ, yielding the n − t non-essential shadows NE₁, NE₂, …, NEₙ₋ₜ, respectively.…”
Section: A Methods For (T K N)-threshold Preview-able Essential Secre...mentioning
confidence: 99%
“…Building upon the framework established by Thien and Lin [3], Chen and Lin [4] introduced a progressive secret image transmission method rooted in secret image sharing. To counteract potential security threats posed by hackers, they devised secret image sharing mechanisms incorporating meaningful or disguised shares were designed [5,6]. Additionally, various research endeavors within the realm of secret image sharing [7][8][9][10][11][12][13][14][15][16][17][18][19][20] include verifiable secret image sharing schemes [7,8], essential secret image sharing methodologies [9][10][11][12][13][14][15][16], among others.…”
Section: Introductionmentioning
confidence: 99%
“…Degraded images may affect the accuracy of image detection and image classification [1,2]. Image restoration obtains original clean images from observed ones according to the following image degradation module:…”
Section: Introductionmentioning
confidence: 99%