The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing...
This study presents a novel scheme called a dual verifying (t, n) visual secret sharing scheme. In our proposed scheme, each participant receives a public key and an encrypted shadow instead of the original secret image through the public communication network. There are three goals achieved. The first is to generate a reconstructed secret image, which satisfies the general criteria high security,...
This paper proposes a data hiding method by secret sharing. The proposed method embeds a k-bit secret digit in a secret message (i.e., a bit stream, a secret image) into a cover pixel of a grayscale cover image at a time by generating two shadow pixels. The two shadow images produced by the proposed scheme are meaningful. The experimental results show that the proposed scheme achieves good visual...
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed to hide data in 8-bits gray-scale cover image based on a 256times256 secret reference matrix (SRM) which was constructed by using a 3times3 table with unrepeated digits from 0~8. Experimental...
In this paper, we propose a novel scheme called a self-verifying visual secret sharing scheme, which can be applied to both grayscale and color images. This scheme uses two halftone images. The first, considered to be the host image, is created by directly applying a halftoning technique to the original secret image. The other, regarded as the logo, is generated from the host image by exploiting the...
Two VQ-based image-tamper-proofing schemes for digital grayscale images are presented in this paper. The first scheme, which we call Scheme-1, partitions a VQ codebook into two sub-codebooks called the sub-codebook 0 and the sub-codebook 1. The sub-codebook 0 is used to imply embed authentication bit 0, and sub-codebook 1 is used to imply authentication bit 1. Once an intruder has modified the signed...
The object of our research is to embed secret images with high-capacity and high-quality of the stego image. Taking advantage of the small difference among close neighboring pixels, the secret image can be compressed to be a collection of which each component is either a secret pixel or the difference between two neighboring pixels. Then the collection can be entirely embedded into cover image by...
Lossless data hiding enables the embedding of messages in a host image without any loss of content. In this paper, we present a lossless data hiding technique based on histogram modification for image authentication that is lossless in the sense that if the marked image is deemed authentic, the embedding distortion can be completely removed from the marked image after the embedded message has been...
In this paper, we share and embed secrets with images using secret expansion in such a way that secrets are easily reconstructable from the two shares, but getting any one share reveals no information about the secrets. After the reconstruction scheme, the original image can be completely recovered. The proposed scheme is simple without using any data compression and without any extra information.
In 2007, Wang et al. proposed two visual secret sharing schemes based on Boolean operations. One is a probabilistic (2, n) secret sharing (SS) scheme, called (2, n) ProbVSS scheme, for binary images and the other is a deterministic (n, n) SS scheme for grayscale images. Their schemes can solve the problems of computational complexity and pixel expansion at the same time. To provide a (2, n) ProbVSS...
In 2007, Wang et al. proposed two visual secret sharing (VSS) schemes based on Boolean operations. The first one is a probabilistic (2, n) secret sharing scheme called (2, n) ProbVSS scheme for binary images. The other is a deterministic (n, n) secret sharing scheme for grayscale images. Although Wang et al.psilas two schemes solve the problems of computational complexity and pixel expansion at the...
Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Zhang and Wang's method and Sudoku solutions. A selected Sudoku solution is used to guide cover pixels' modification in order to imply...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.