سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Secret Image Sharing with High Quality Stego Images

Publish Year: 1388
Type: Conference paper
Language: English
View: 1,995

This Paper With 6 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ISCC06_011

Index date: 7 July 2010

Secret Image Sharing with High Quality Stego Images abstract

In this paper, we propose a novel (t,n)-threshold secret sharing scheme. The scheme employs the concept of cellular automata and is suitable for sharing secret images. The scheme divides the secret image into some shadows which are then embedded in predetermined cover images and the resulting stego images are distributed among participants. The probability that a participant can successfully tamper his/her data is about 1/256 and the computational complexity of the secret recovery process is O(n). Instead of embedding authentication bits in cover images, our scheme hides those in cellular automata and therefore our stego images are of high quality. Moreover, the original secret images can be restored completely without any distortion. We further conduct experiments to compare the scheme with previous methods.

Secret Image Sharing with High Quality Stego Images Keywords:

Secret Sharing Scheme , Linear Memory Cellular Automata , Authentication Verifiability

Secret Image Sharing with High Quality Stego Images authors

Ziba Eslami

Department of Computer Science

Jamal Zarepour Ahmadabadi

Department of Computer Science,Shahid Beheshti University, G.C.,Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
C. Lin and W. Tsai, "Secret image sharing with steganography ...
C. Yang, T. Chen, K. Yu, and C. Wang, "Improve- ...
C. Chang, Y. Hsieh, and C. Lin, "Sharing secrets in ...
N. Noar and A Shamir, "Visual cryptography, " Advances in ...
نمایش کامل مراجع