A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capabilities of steganography and authentication is proposed.
scholar.google.com › citations
Sep 19, 2023 · In this paper a novel SIS scheme based on homogeneous linear recursion (HLR) with steganography and authentication for Absolute Moment Block Truncation Coding ...
Abstract: In this paper, a method is proposed to protect a secret image by applying (t, n) threshold scheme. The proposed method first divides the pixels in ...
Secret image sharing with steganography and authentication
www.researchgate.net › publication › 22...
Oct 22, 2024 · A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capabilities of steganography and ...
Two methods, cryptography and steganography have been used to protect secure data from malicious users on the internet. Cryptography transforms a secret data ...
Steganography is a technique for transmitting secret data without being noticed. This technique hides secret messages into cover media to avoid malicious ...
Some image secret shar- ing schemes with steganography and authentication were proposed to further protect the qualification of the stego images [12-15]. For ...
People also ask
What is secret image sharing?
What is image steganography?
What is a secret message in steganography?
What is secret key steganography?
A new approach to the secret image sharing with steganography and ...
www.tandfonline.com › doi › abs
Jul 18, 2013 · Steganography can be viewed as cryptography. It includes a variety of secret communication methods that embed the existence of the message and ...
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication is proposed ...
They are not only improve authentication ability and image quality of stego-image, but also introduce a lossless image sharing scheme for secret image.