Secret image sharing with steganography and authentication
Top Cited Papers
- 31 December 2004
- journal article
- Published by Elsevier BV in Journal of Systems and Software
- Vol. 73 (3), 405-414
- https://doi.org/10.1016/s0164-1212(03)00239-5
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Visual cryptography for gray-level images by dithering techniquesPattern Recognition Letters, 2003
- Visual cryptography for grey level imagesInformation Processing Letters, 2000
- Digital watermarking for telltale tamper proofing and authenticationProceedings of the IEEE, 1999
- Hidden digital watermarks in imagesIEEE Transactions on Image Processing, 1999
- Constructions and Properties of k out of n Visual Secret Sharing SchemesDesigns, Codes and Cryptography, 1997
- Techniques for data hidingIBM Systems Journal, 1996
- Visual cryptographyLecture Notes in Computer Science, 1995
- Construction of dynamic threshold schemesElectronics Letters, 1994
- A new generalized group-oriented cryptoscheme without trusted centersIEEE Journal on Selected Areas in Communications, 1993
- How to share a secretCommunications of the ACM, 1979