Citation: Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang. Security protection using two different image shadows with authentication[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093
[1] | X. Cao, L. Du and X. Wei, et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybern., 46 (2016), 1132–1143. |
[2] | A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613. |
[3] | G. R. Blakley, Safeguarding cryptographic keys, Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, USA, 48 (1979), 313–317. |
[4] | M. Naor and A. Shamir, Visual cryptography, Proceedings of Advances in Cryptology-Eurocrypt'94, Perugia, Italy, 1995, 1–12. |
[5] | S. J. Shyu, Efficient visual secret sharing scheme for color images, Pattern Recognit., 39 (2006), 866–880. |
[6] | C. N. Yang and T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognit., 39 (2006), 1300–1314. |
[7] | C. N. Yang, K. H. Yu and R. Lukac, User-friendly image sharing using polynomials with different primes, Int. J. Imaging Syst. Technol., 17 (2007), 40–47. |
[8] | C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst., 13 (2003), 1161–1169. |
[9] | C. C. Chang, C.Y. Lin and C. S. Tseng, Secret image hiding and sharing based on the (t, n)-threshold, Fundam. Inform., 76 (2007), 399–411. |
[10] | X. T. Wu and W. Sun, Generalized random grid and its applications in visual cryptography, IEEE Trans. Inf. Forensics Secur., 8 (2013), 1541–1553. |
[11] | C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit., 41(2008), 3130–3137. |
[12] | P. Y. Lin, J. S. Lee and C. C. Chang, Distortion-free secret image sharing mechanism using modulus operator, Pattern Recognit., 42 (2009), 886–895. |
[13] | C. C. Chang, T. D. Kieu and Y. C. Chou, Reversible data hiding scheme using two steganographic images, Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, 2007, 1–4. |
[14] | C. Qin, C. C. Chang and T. J. Hsu, Reversible data hiding scheme based on exploiting modification direction with two steganographic images, Multimed. Tools Appl., 74 (2015), 5861–5872. |
[15] | N. T. Huynh, K. Bharanitharan and C. C. Chang, Quadri-directional searching algorithm for secret image sharing using meaningful shadows, J. Vis. Commun. Image Represent., 28 (2015), 105–112. |
[16] | C. C. Chang, Y. Liu and T. S. Nguyen, A novel turtle shell based scheme for data hiding, The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, 2014, 89–93. |