scispace - formally typeset
Journal ArticleDOI

Secret sharing with multi-cover adaptive steganography

Hai-Dong Yuan
- 01 Jan 2014 - 
- Vol. 254, pp 197-212
Reads0
Chats0
TLDR
The proposed secret sharing methods for natural images based on multi-cover adaptive steganography are more secure in terms of resistance against state-of-the-art steganalysis techniques and can be used to adaptively embed location-sensitive secrets.
About
This article is published in Information Sciences.The article was published on 2014-01-01. It has received 62 citations till now. The article focuses on the topics: Steganography tools & Homomorphic secret sharing.

read more

Citations
More filters
Journal ArticleDOI

Image steganography in spatial domain: A survey

TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI

Video steganography: A review

TL;DR: The performance assessment for video Steganography and the future popular video steganography including H.265 video stegansography, robust video steGANography and reversible video steaganography are introduced.
Journal ArticleDOI

Data hiding in scrambled images: A new double layer security data hiding technique

TL;DR: A data hiding technique based on the concepts of scrambling and pseudorandom data hiding is presented to provide a data hiding system with two layer security to the embedded data, and good perceptual transparency of the stego images.
Journal ArticleDOI

A discussion on the relationship between probabilistic visual cryptography and random grid

TL;DR: The probabilistic VCS without pixel expansion is used, to study the construction and performance of RG, and it is pointed out that RG and PVCS have no difference other than the terminology, which is a subset of PVCSs.
Journal ArticleDOI

Improved Visual Secret Sharing Scheme for QR Code Applications

TL;DR: This paper proposes a visual secret sharing scheme to encode a secret QR code into several shares that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers.
References
More filters
Journal ArticleDOI

Image quality assessment: from error visibility to structural similarity

TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

A Practical Guide to Support Vector Classication

TL;DR: A simple procedure is proposed, which usually gives reasonable results and is suitable for beginners who are not familiar with SVM.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Related Papers (5)