Journal ArticleDOI
Secret sharing with multi-cover adaptive steganography
Reads0
Chats0
TLDR
The proposed secret sharing methods for natural images based on multi-cover adaptive steganography are more secure in terms of resistance against state-of-the-art steganalysis techniques and can be used to adaptively embed location-sensitive secrets.About:
This article is published in Information Sciences.The article was published on 2014-01-01. It has received 62 citations till now. The article focuses on the topics: Steganography tools & Homomorphic secret sharing.read more
Citations
More filters
Journal ArticleDOI
Image steganography in spatial domain: A survey
Mehdi Hussain,Mehdi Hussain,Ainuddin Wahid Abdul Wahab,Yamani Idna Bin Idris,Anthony T. S. Ho,Anthony T. S. Ho,Anthony T. S. Ho,Ki-Hyun Jung +7 more
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI
Video steganography: A review
TL;DR: The performance assessment for video Steganography and the future popular video steganography including H.265 video stegansography, robust video steGANography and reversible video steaganography are introduced.
Journal ArticleDOI
Data hiding in scrambled images: A new double layer security data hiding technique
TL;DR: A data hiding technique based on the concepts of scrambling and pseudorandom data hiding is presented to provide a data hiding system with two layer security to the embedded data, and good perceptual transparency of the stego images.
Journal ArticleDOI
A discussion on the relationship between probabilistic visual cryptography and random grid
TL;DR: The probabilistic VCS without pixel expansion is used, to study the construction and performance of RG, and it is pointed out that RG and PVCS have no difference other than the terminology, which is a subset of PVCSs.
Journal ArticleDOI
Improved Visual Secret Sharing Scheme for QR Code Applications
Yuqiao Cheng,Zhengxin Fu,Bin Yu +2 more
TL;DR: This paper proposes a visual secret sharing scheme to encode a secret QR code into several shares that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers.
References
More filters
Journal ArticleDOI
Image quality assessment: from error visibility to structural similarity
TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
A Practical Guide to Support Vector Classication
TL;DR: A simple procedure is proposed, which usually gives reasonable results and is suitable for beginners who are not familiar with SVM.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.