The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1186/s13634-015-0196-z
|View full text |Cite
|
Sign up to set email alerts
|

Progressive sharing of multiple images with sensitivity-controlled decoding

Abstract: Secure sharing of digital images is becoming an important issue. Consequently, many schemes for ensuring image sharing security have been proposed. However, existing approaches focus on the sharing of a single image, rather than multiple images. We propose three kinds of sharing methods that progressively reveal n given secret images according to the sensitivity level of each image. Method 1 divides each secret image into n parts and then combines and hides the parts of the images to get n steganographic (steg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
(34 reference statements)
0
0
0
Order By: Relevance
“…Because sharing is useful, all four aforementioned papers [1][2][3][4] have been frequently cited, particularly Shamir [1], which has had more than 10,000 citations from 1979 to 2019. Many recent studies have also focused on sharing [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Finally, as for image sharing, some readers may wonder why one cannot just use a key to encrypt the secret image and then share the key with authorized personnel.…”
Section: Introductionmentioning
confidence: 99%
“…Because sharing is useful, all four aforementioned papers [1][2][3][4] have been frequently cited, particularly Shamir [1], which has had more than 10,000 citations from 1979 to 2019. Many recent studies have also focused on sharing [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Finally, as for image sharing, some readers may wonder why one cannot just use a key to encrypt the secret image and then share the key with authorized personnel.…”
Section: Introductionmentioning
confidence: 99%