메뉴 건너뛰기




Volumn 41, Issue 10, 2008, Pages 3130-3137

Sharing secrets in stego images with authentication

Author keywords

(k, n) Threshold; Authentication; Secret image sharing; Steganography

Indexed keywords

ACCESS CONTROL; ALUMINUM; AUTHENTICATION; CRYPTOGRAPHY; QUALITY ASSURANCE; RELIABILITY;

EID: 45549098627     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.04.006     Document Type: Article
Times cited : (252)

References (23)
  • 2
    • 0033078023 scopus 로고    scopus 로고
    • Visual cryptography and threshold schemes
    • Stinson D.R. Visual cryptography and threshold schemes. IEEE Potentials 18 1 (1999) 13-16
    • (1999) IEEE Potentials , vol.18 , Issue.1 , pp. 13-16
    • Stinson, D.R.1
  • 3
    • 33244471538 scopus 로고    scopus 로고
    • Efficient visual secret sharing scheme for color images
    • Shyu S.J. Efficient visual secret sharing scheme for color images. Pattern Recognition 39 5 (2006) 866-880
    • (2006) Pattern Recognition , vol.39 , Issue.5 , pp. 866-880
    • Shyu, S.J.1
  • 4
    • 10044234907 scopus 로고    scopus 로고
    • Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
    • Yang C.N., and Chen T.S. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition 26 2 (2005) 193-206
    • (2005) Pattern Recognition , vol.26 , Issue.2 , pp. 193-206
    • Yang, C.N.1    Chen, T.S.2
  • 5
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information Processing Societies, NY, USA
    • Blakley G.R. Safeguarding cryptographic keys. Proceedings of the National Computer Conference (1979), American Federation of Information Processing Societies, NY, USA 313-317
    • (1979) Proceedings of the National Computer Conference , pp. 313-317
    • Blakley, G.R.1
  • 6
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun. ACM 22 11 (1979) 612-613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 7
    • 33646098909 scopus 로고    scopus 로고
    • Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
    • Yang C.N., and Chen T.S. Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition 39 7 (2006) 1300-1314
    • (2006) Pattern Recognition , vol.39 , Issue.7 , pp. 1300-1314
    • Yang, C.N.1    Chen, T.S.2
  • 8
    • 0347946754 scopus 로고    scopus 로고
    • An image-sharing method with user-friendly shadow images
    • Thien C.C., and Lin J.C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Systems 13 12 (2003) 1161-1169
    • (2003) IEEE Trans. Circuits Systems , vol.13 , Issue.12 , pp. 1161-1169
    • Thien, C.C.1    Lin, J.C.2
  • 9
    • 34547467334 scopus 로고    scopus 로고
    • User-friendly image sharing using polynomials with different primes
    • Yang C.N., Yu K.H., and Lukac R. User-friendly image sharing using polynomials with different primes. Int. J. Imaging Systems Technol. 17 1 (2007) 40-47
    • (2007) Int. J. Imaging Systems Technol. , vol.17 , Issue.1 , pp. 40-47
    • Yang, C.N.1    Yu, K.H.2    Lukac, R.3
  • 10
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. J. Systems Software 73 3 (2004) 405-414
    • (2004) J. Systems Software , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 11
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
    • (2004) Pattern Recognition , vol.37 , Issue.7 , pp. 1377-1385
    • Wu, Y.S.1    Thien, C.C.2    Lin, J.C.3
  • 12
    • 34248584507 scopus 로고    scopus 로고
    • Improvements of image sharing with steganography and authentication
    • Yang C.N., Chen T.S., Yu K.H., and Wang C.C. Improvements of image sharing with steganography and authentication. J. Systems Software 80 7 (2007) 1070-1076
    • (2007) J. Systems Software , vol.80 , Issue.7 , pp. 1070-1076
    • Yang, C.N.1    Chen, T.S.2    Yu, K.H.3    Wang, C.C.4
  • 13
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141 1-2 (2002) 123-138
    • (2002) Inf. Sci. , vol.141 , Issue.1-2 , pp. 123-138
    • Chang, C.C.1    Chen, T.S.2    Chung, L.Z.3
  • 14
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: seeing the unseen
    • Johnson N.F., and Jajodia S. Exploring steganography: seeing the unseen. IEEE Comput. 31 2 (1998) 26-34
    • (1998) IEEE Comput. , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 16
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett 24 9-10 (2003) 1613-1626
    • (2003) Pattern Recognition Lett , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 17
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 474-496
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 474-496
    • Chan, C.K.1    Cheng, L.M.2
  • 18
    • 0037411306 scopus 로고    scopus 로고
    • Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy
    • Chang C.C., Hsiao J.Y., and Chan C.S. Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 7 (2003) 1583-1595
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1583-1595
    • Chang, C.C.1    Hsiao, J.Y.2    Chan, C.S.3
  • 19
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
    • (2001) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 20
    • 33644985948 scopus 로고    scopus 로고
    • Image hiding scheme with modulus function and dynamic programming
    • Chang C.C., Chan C.S., and Fan Y.H. Image hiding scheme with modulus function and dynamic programming. Pattern Recognition 39 6 (2006) 1155-1167
    • (2006) Pattern Recognition , vol.39 , Issue.6 , pp. 1155-1167
    • Chang, C.C.1    Chan, C.S.2    Fan, Y.H.3
  • 21
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
    • (2003) Pattern Recognition , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 22
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for embedding secret image
    • Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164 1 (2005) 99-116
    • (2005) Appl. Math. Comput. , vol.164 , Issue.1 , pp. 99-116
    • Wang, S.J.1
  • 23
    • 0036794537 scopus 로고    scopus 로고
    • Secret image sharing
    • Thien C.C., and Lin J.C. Secret image sharing. Comput. Graphics 26 5 (2002) 765-770
    • (2002) Comput. Graphics , vol.26 , Issue.5 , pp. 765-770
    • Thien, C.C.1    Lin, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.