Journal ArticleDOI
Selective scalable secret image sharing with verification
Jung-San Lee,You-Ren Chen +1 more
Reads0
Chats0
TLDR
The Salient map is introduced to develop a new method, in which the ROIs (region of interesting) of secret image can be revealed progressively, and to the best of the authors' knowledge, this is the first SSIS that employs a meaningful shadow.Abstract:
Scalable secret image sharing (SSIS) is a new secret image sharing technique. The feature of scalability refers to the fact that the revealed secret information is proportional to the number of gathered shadows. Once all of the valid shadows are collected, the complete secret can be revealed easily. The kernel of secret information, however, may be leaked out with a few shadows collected in the existing SSIS mechanisms. This is because researchers seldom concerned about secret distribution. Thus, we introduce the Salient map to develop a new method, in which the ROIs (region of interesting) of secret image can be revealed progressively. Additionally, we introduce the concepts of meaningful shadow and verification to SSIS. To the best of our knowledge, this is the first SSIS that employs a meaningful shadow. The leading adoption can greatly help reduce the attention of attackers in order to enhance the security, while the second concept can avoid malicious behaviors from outside attackers or dishonest members.read more
Citations
More filters
Journal ArticleDOI
Image splicing detection based on Markov features in discrete octonion cosine transform domain
Hongda Sheng,Hongda Sheng,Xuanjing Shen,Xuanjing Shen,Lyu Yingda,Zenan Shi,Zenan Shi,Shuyang Ma +7 more
TL;DR: A novel passive image forgery detection method based on DOCT (discrete octonion cosine transform) and Markov and the K -fold cross-validation is introduced to improve the identification performance of the classifier.
Journal ArticleDOI
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.
TL;DR: This paper presents a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging and has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image.
Journal ArticleDOI
Unsupervised segmentation and elm for fabric defect image classification
TL;DR: Experimental results show that the proposed fabric defect classification method can classify the fabric defect image with high accuracy and efficiency that can better meet the requirements for practical applications.
Journal ArticleDOI
A hybrid classifier combination for home automation using EEG signals
TL;DR: A hybrid model which makes use of Long Short-Term Memory which is considered as a robust temporal classification model in AI and classical Random Forest Classifier for EEG classification is presented.
Journal ArticleDOI
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication
TL;DR: In the two schemes, the original secret image and the cover image can be recovered losslessly, the performances of IWT-ILSISA are better than other similar schemes in the terms of embedding capacity, authentication capability and visual quality of the stego cover image.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
Salient Object Detection: A Discriminative Regional Feature Integration Approach
TL;DR: This paper regards saliency map computation as a regression problem, which is based on multi-level image segmentation, and uses the supervised learning approach to map the regional feature vector to a saliency score, and finally fuses the saliency scores across multiple levels, yielding the salency map.
Journal ArticleDOI
Secret image sharing
Chih-Ching Thien,Ja-Chen Lin +1 more
TL;DR: A method such that a secret image is shared by n shadow images, and any r shadow images of them can be used to restore the whole secret image, and the size of each shadow image is smaller than the secret image in this method.
Journal ArticleDOI
Secret image sharing with steganography and authentication
Chang-Chou Lin,Wen-Hsiang Tsai +1 more
TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.
Journal ArticleDOI
Improvements of image sharing with steganography and authentication
TL;DR: A scheme to improve authentication ability that prevents dishonest participants from cheating is presented and the arrangement of embedded bits is defined to improve the quality of stego-image.
Related Papers (5)
Low-cost 3D motion capture system using passive optical markers and monocular vision
Yeonkyung Lee,Hoon Yoo +1 more