2021
DOI: 10.1109/access.2021.3056893
|View full text |Cite
|
Sign up to set email alerts
|

Robust Secret Image Sharing Scheme Against Noise in Shadow Images

Abstract: The (k, n)-threshold secret image sharing scheme is an image protection method, whose security comes partly from precise mathematical calculations, and even a little change in shadow images will lead to a false recovered image. Thus, it is crucial to recover the secret image information in the presence of possible noise on shadow images, which has rarely been considered in previous work. In this paper, a robust (k, n)-threshold polynomial-based secret image sharing scheme(RPSIS) against noise on shadow images … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…What is more, the RSS scheme can be applied in the situation where the number of shares is large [36]. Also, we can apply RSS in other fields such as robust secret image sharing and threshold private set intersection [37,38].…”
Section: Discussionmentioning
confidence: 99%
“…What is more, the RSS scheme can be applied in the situation where the number of shares is large [36]. Also, we can apply RSS in other fields such as robust secret image sharing and threshold private set intersection [37,38].…”
Section: Discussionmentioning
confidence: 99%
“…Some of the recent related works on image steganography are listed as follows: Sun et al [24] proposed Cloud Eyes, a cloud-based antimalware system. The proposed system provided efficient and trusted security services to the devices in the IoT network.…”
Section: Related Workmentioning
confidence: 99%
“…In 2002, Thien and Lin realized SIS for the first time [3]. Many researches focus on SIS with various realizations [4][5][6], and continuously study the applications [7][8][9] and improvements [10][11][12][13]. With the development of network technology, users are increasingly demanding the security, robustness and efficiency of secret image transmission.…”
Section: Introductionmentioning
confidence: 99%
“…The following analyses support three payload situations from (n, n)-threshold IHSD-PMSISS. According to Equation ( 7), the embedding rate of (n, n)-threshold IHSD-PMSISS in 2-bit payload denoted by ER I HSD−PMSISS 2−bit is calculated in Equation (13).…”
mentioning
confidence: 99%