Export file:

Format

  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text

Content

  • Citation Only
  • Citation and Abstract

Security protection using two different image shadows with authentication

1 Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2 College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, Fujian, China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Security protection using two different image shadows with authentication
  Figure/Table
  Supplementary
  Article Metrics

References

1. X. Cao, L. Du and X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybern., 46 (2016), 1132–1143.

2. A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.

3. G. R. Blakley, Safeguarding cryptographic keys, Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, USA, 48 (1979), 313–317.

4. M. Naor and A. Shamir, Visual cryptography, Proceedings of Advances in Cryptology-Eurocrypt'94, Perugia, Italy, 1995, 1–12.

5. S. J. Shyu, Efficient visual secret sharing scheme for color images, Pattern Recognit., 39 (2006), 866–880.

6. C. N. Yang and T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognit., 39 (2006), 1300–1314.

7. C. N. Yang, K. H. Yu and R. Lukac, User-friendly image sharing using polynomials with different primes, Int. J. Imaging Syst. Technol., 17 (2007), 40–47.

8. C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst., 13 (2003), 1161–1169.

9. C. C. Chang, C.Y. Lin and C. S. Tseng, Secret image hiding and sharing based on the (t, n)-threshold, Fundam. Inform., 76 (2007), 399–411.

10. X. T. Wu and W. Sun, Generalized random grid and its applications in visual cryptography, IEEE Trans. Inf. Forensics Secur., 8 (2013), 1541–1553.

11. C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41(2008), 3130–3137.

12. P. Y. Lin, J. S. Lee and C. C. Chang, Distortion-free secret image sharing mechanism using modulus operator, Pattern Recognit., 42 (2009), 886–895.

13. C. C. Chang, T. D. Kieu and Y. C. Chou, Reversible data hiding scheme using two steganographic images, Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, 2007, 1–4.

14. C. Qin, C. C. Chang and T. J. Hsu, Reversible data hiding scheme based on exploiting modification direction with two steganographic images, Multimed. Tools Appl., 74 (2015), 5861–5872.

15. N. T. Huynh, K. Bharanitharan and C. C. Chang, Quadri-directional searching algorithm for secret image sharing using meaningful shadows, J. Vis. Commun. Image Represent., 28 (2015), 105–112.

16. C. C. Chang, Y. Liu and T. S. Nguyen, A novel turtle shell based scheme for data hiding, The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, 2014, 89–93.

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Article outline

Show full outline
Copyright © AIMS Press All Rights Reserved