Export file:


  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text


  • Citation Only
  • Citation and Abstract

Security protection using two different image shadows with authentication

1 Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2 College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, Fujian, China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Security protection using two different image shadows with authentication
  Article Metrics

Keywords security protection; secret image sharing (SIS); meaningful shadow; turtle shell matrix; cheating detection

Citation: Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang. Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093


  • 1. X. Cao, L. Du and X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybern., 46 (2016), 1132–1143.
  • 2. A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.
  • 3. G. R. Blakley, Safeguarding cryptographic keys, Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, USA, 48 (1979), 313–317.
  • 4. M. Naor and A. Shamir, Visual cryptography, Proceedings of Advances in Cryptology-Eurocrypt'94, Perugia, Italy, 1995, 1–12.
  • 5. S. J. Shyu, Efficient visual secret sharing scheme for color images, Pattern Recognit., 39 (2006), 866–880.
  • 6. C. N. Yang and T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognit., 39 (2006), 1300–1314.
  • 7. C. N. Yang, K. H. Yu and R. Lukac, User-friendly image sharing using polynomials with different primes, Int. J. Imaging Syst. Technol., 17 (2007), 40–47.
  • 8. C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst., 13 (2003), 1161–1169.
  • 9. C. C. Chang, C.Y. Lin and C. S. Tseng, Secret image hiding and sharing based on the (t, n)-threshold, Fundam. Inform., 76 (2007), 399–411.
  • 10. X. T. Wu and W. Sun, Generalized random grid and its applications in visual cryptography, IEEE Trans. Inf. Forensics Secur., 8 (2013), 1541–1553.
  • 11. C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41(2008), 3130–3137.
  • 12. P. Y. Lin, J. S. Lee and C. C. Chang, Distortion-free secret image sharing mechanism using modulus operator, Pattern Recognit., 42 (2009), 886–895.
  • 13. C. C. Chang, T. D. Kieu and Y. C. Chou, Reversible data hiding scheme using two steganographic images, Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, 2007, 1–4.
  • 14. C. Qin, C. C. Chang and T. J. Hsu, Reversible data hiding scheme based on exploiting modification direction with two steganographic images, Multimed. Tools Appl., 74 (2015), 5861–5872.
  • 15. N. T. Huynh, K. Bharanitharan and C. C. Chang, Quadri-directional searching algorithm for secret image sharing using meaningful shadows, J. Vis. Commun. Image Represent., 28 (2015), 105–112.
  • 16. C. C. Chang, Y. Liu and T. S. Nguyen, A novel turtle shell based scheme for data hiding, The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, 2014, 89–93.


Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved