메뉴 건너뛰기




Volumn 84, Issue 12, 2011, Pages 2196-2207

A high quality image sharing with steganography and adaptive authentication scheme

Author keywords

(k, n) Threshold scheme; Authentication code; Cryptography; Fragile watermark; Hash message authentication code; Optimal pixel adjustment; Secret sharing; Steganography

Indexed keywords

(K, N)-THRESHOLD SCHEME; AUTHENTICATION CODE; FRAGILE WATERMARK; MESSAGE AUTHENTICATION CODES; OPTIMAL PIXEL ADJUSTMENT; SECRET SHARING;

EID: 80053566409     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.06.021     Document Type: Article
Times cited : (78)

References (35)
  • 1
    • 33847656645 scopus 로고    scopus 로고
    • Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
    • DOI 10.1016/j.jss.2006.07.006, PII S0164121206001981
    • A. Castiglione, A. De Santis, and C. Soriente Taking advantages of a disadvantage: digital forensics and steganography using document metadata Journal of Systems and Software 80 5 2007 750 764 (Pubitemid 46367885)
    • (2007) Journal of Systems and Software , vol.80 , Issue.5 , pp. 750-764
    • Castiglione, A.1    De Santis, A.2    Soriente, C.3
  • 3
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • DOI 10.1016/j.patcog.2003.08.007
    • C.-K. Chan, and L.M. Cheng Hiding data in images by simple LSB substitution Pattern Recognition 37 3 2004 469 474 (Pubitemid 38003086)
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.-K.1    Cheng, L.M.2
  • 4
    • 33646519145 scopus 로고    scopus 로고
    • A new multi-stage secret sharing scheme using one-way function
    • DOI 10.1145/1044552.1044557
    • T.-Y. Chang, M.-S. Hwang, and W.-P. Wang A new multi-stage secret sharing scheme using one-way function ACM SIGOPS Operating Systems Review 39 1 2005 48 55 (Pubitemid 44849610)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.1 , pp. 48-55
    • Chang, T.-Y.1    Hwang, M.-S.2    Yang, W.-P.3
  • 5
    • 45549098627 scopus 로고    scopus 로고
    • Sharing secrets in stego images with authentication
    • C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin Sharing secrets in stego images with authentication Pattern Recognition 41 10 2008 3130 3137
    • (2008) Pattern Recognition , vol.41 , Issue.10 , pp. 3130-3137
    • Chang, C.-C.1    Hsieh, Y.-P.2    Lin, C.-H.3
  • 6
    • 79960457002 scopus 로고    scopus 로고
    • A secure fragile watermarking scheme based on chaos-and-hamming code
    • doi:10.1016/j.jss.2011.02.029 in press, Corrected Proof, Available online 21 March, ISSN 0164-1212
    • Chang, C.-C.; Chen, K.-N.; Lee, C.-F.; Liu, L.-J.; A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, in press, Corrected Proof, Available online 21 March 2011, ISSN 0164-1212, doi:10.1016/j.jss.2011.02.029 (http://www.sciencedirect.com/science/ article/pii/S0164121211000549).
    • (2011) Journal of Systems and Software
    • Chang C., .-C.1    Chen K., .-N.2    Lee C., .-F.3    Liu L., .-J.4
  • 7
    • 79952438505 scopus 로고    scopus 로고
    • Secret image sharing with authentication-chaining and dynamic embedding
    • Z. Eslami, and J.Z. Ahmadabadi Secret image sharing with authentication-chaining and dynamic embedding Journal of Systems and Software 84 5 2011 803 809
    • (2011) Journal of Systems and Software , vol.84 , Issue.5 , pp. 803-809
    • Eslami, Z.1    Ahmadabadi, J.Z.2
  • 9
    • 84886634682 scopus 로고
    • Comment on "multistage secret sharing based on one-way function"
    • L. Harn Comment on "Multistage secret sharing based on one-way function" Electronics Letters 31 4 1995 262
    • (1995) Electronics Letters , vol.31 , Issue.4 , pp. 262
    • Harn, L.1
  • 10
    • 0029197220 scopus 로고
    • Multisecret-sharing scheme based on one-way function
    • J. He, and E. Dawson Multisecret-sharing scheme based on one-way function Electronics Letters 31 2 1995 93 95
    • (1995) Electronics Letters , vol.31 , Issue.2 , pp. 93-95
    • He, J.1    Dawson, E.2
  • 14
    • 0037096996 scopus 로고    scopus 로고
    • A public verifiable copy protection technique for still images
    • DOI 10.1016/S0164-1212(01)00142-X, PII S016412120100142X
    • W.-B. Lee, and T.-H. Chen A public verifiable copy protection technique for still images Journal of Systems and Software 62 3 2002 195 204 (Pubitemid 34524930)
    • (2002) Journal of Systems and Software , vol.62 , Issue.3 , pp. 195-204
    • Lee, W.-B.1    Chen, T.-H.2
  • 15
    • 77549088025 scopus 로고    scopus 로고
    • A novel data hiding scheme based on modulus function
    • C.-F. Lee, and H.-L. Chen A novel data hiding scheme based on modulus function Journal of Systems and Software 83 5 2010 832 843
    • (2010) Journal of Systems and Software , vol.83 , Issue.5 , pp. 832-843
    • Lee, C.-F.1    Chen, H.-L.2
  • 16
    • 33748785719 scopus 로고    scopus 로고
    • Security of fragile watermarking scheme for image authentication
    • DOI 10.1179/174313106X106278
    • K.-C. Liao, W.-B. Lee, and C.-W. Liao Security of fragile watermarking scheme for image authentication Imaging Science Journal 54 September (3) 2006 129 133 (Pubitemid 44408642)
    • (2006) Imaging Science Journal , vol.54 , Issue.3 , pp. 129-133
    • Liao, K.-C.1    Lee, W.-B.2    Liao, C.-W.3
  • 17
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • C.-C. Lin, and W.-H. Tsai Secret image sharing with steganography and authentication Journal of Systems and Software 73 3 2004 405 414
    • (2004) Journal of Systems and Software , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.-C.1    Tsai, W.-H.2
  • 18
    • 0037869332 scopus 로고    scopus 로고
    • Fragile watermarking scheme for image authentication
    • Jun
    • H.-T. Lu, R.-M. Shen, and F.-L. Chung Fragile watermarking scheme for image authentication Electronics Letters 39 12 2003 898 900 Jun
    • (2003) Electronics Letters , vol.39 , Issue.12 , pp. 898-900
    • Lu, H.-T.1    Shen, R.-M.2    Chung, F.-L.3
  • 21
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A.T. Sherman, and D.A. McGrew Key establishment in large dynamic groups using one-way function trees IEEE Transactions on Software Engineering 29 5 2003 444 458
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 23
    • 0036794537 scopus 로고    scopus 로고
    • Secret image sharing
    • DOI 10.1016/S0097-8493(02)00131-0, PII S0097849302001310
    • C.-C. Thien, and J.-C. Lin Secret image sharing Computers & Graphics 26 5 2002 765 770 (Pubitemid 35152309)
    • (2002) Computers and Graphics (Pergamon) , vol.26 , Issue.5 , pp. 765-770
    • Thien, C.-C.1    Lin, J.-C.2
  • 25
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • DOI 10.1016/S0031-3203(03)00221-8
    • C.-C. Thien, and J.-C. Lin A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function Pattern Recognition 36 12 2003 2875 2881 (Pubitemid 37293400)
    • (2003) Pattern Recognition , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.-C.1    Lin, J.-C.2
  • 26
    • 78951495249 scopus 로고    scopus 로고
    • Medical image security and EPR hiding using Shamir's secret sharing scheme
    • M. Ulutas, G. Ulutas, and V.V. Nabiyev Medical image security and EPR hiding using Shamir's secret sharing scheme Journal of Systems and Software 84 3 2011 341 353
    • (2011) Journal of Systems and Software , vol.84 , Issue.3 , pp. 341-353
    • Ulutas, M.1    Ulutas, G.2    Nabiyev, V.V.3
  • 27
    • 32844469722 scopus 로고    scopus 로고
    • Secret image sharing with smaller shadow images
    • DOI 10.1016/j.patrec.2005.09.021, PII S0167865505002734
    • R.-Z. Wang, and C.-H. Su Secret image sharing with smaller shadow images Pattern Recognition Letters 27 6 2006 551 555 (Pubitemid 43254598)
    • (2006) Pattern Recognition Letters , vol.27 , Issue.6 , pp. 551-555
    • Wang, R.-Z.1    Su, C.-H.2
  • 28
    • 35848929919 scopus 로고    scopus 로고
    • A high quality steganographic method with pixel-value differencing and modulus function
    • DOI 10.1016/j.jss.2007.01.049, PII S0164121207000593
    • C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang A high quality steganographic method with pixel-value differencing and modulus function Journal of Systems and Software 81 1 2008 150 158 (Pubitemid 350060985)
    • (2008) Journal of Systems and Software , vol.81 , Issue.1 , pp. 150-158
    • Wang, C.-M.1    Wu, N.-I.2    Tsai, C.-S.3    Hwang, M.-S.4
  • 29
    • 0347172700 scopus 로고    scopus 로고
    • Signal and Image Processing Institute at the University of Southern California
    • Weber, A.G.; 2006. The USC-SIPI image database: Version 5, available at http://sipi.usc.edu/database, Signal and Image Processing Institute at the University of Southern California.
    • (2006) The USC-SIPI Image Database: Version 5
    • Weber, A.G.1
  • 34
    • 62349091742 scopus 로고    scopus 로고
    • A comment on "sharing secrets in stegoimages with authentication"
    • C.-N. Yang, and C.-B. Ciou A comment on "Sharing secrets in stegoimages with authentication" Pattern Recognition 42 7 2009 1615 1619
    • (2009) Pattern Recognition , vol.42 , Issue.7 , pp. 1615-1619
    • Yang, C.-N.1    Ciou, C.-B.2
  • 35
    • 34248584507 scopus 로고    scopus 로고
    • Improvements of image sharing with steganography and authentication
    • DOI 10.1016/j.jss.2006.11.022, PII S0164121206003451, Dynamic Resource Management in Distributed Real-Time Systems
    • C.-N. Yang, T.-S. Chen, K.-H. Yu, and C.-C. Wang Improvements of image sharing with steganography and authentication Journal of Systems and Software 80 7 2007 1070 1076 (Pubitemid 46754469)
    • (2007) Journal of Systems and Software , vol.80 , Issue.7 , pp. 1070-1076
    • Yang, C.-N.1    Chen, T.-S.2    Yu, K.H.3    Wang, C.-C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.