Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2009, Article ID 187874, 11 pages
http://dx.doi.org/10.1155/2009/187874
Research Article

Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Department of Computer Engineering, Karadeniz Technical University, 61080 Trabzon, Turkey

Received 13 April 2009; Revised 30 September 2009; Accepted 6 November 2009

Academic Editor: Panos Liatsis

Copyright © 2009 Mustafa Ulutas et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  2. G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the National Computer Conference, pp. 313–317, New York, NY, USA, June 1979.
  3. C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 5, pp. 765–770, 2002. View at Publisher · View at Google Scholar
  4. R.-Z. Wang and C.-H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, no. 6, pp. 551–555, 2006. View at Publisher · View at Google Scholar
  5. C.-C. Chang, C.-C. Lin, C.-H. Lin, and Y.-H. Chen, “A novel secret image sharing scheme in color images using small shadow images,” Information Sciences, vol. 178, no. 11, pp. 2433–2447, 2008. View at Publisher · View at Google Scholar
  6. R. Zhao, J.-J. Zhao, F. Dai, and F.-Q. Zhao, “A new image secret sharing scheme to identify cheaters,” Computer Standards and Interfaces, vol. 31, no. 1, pp. 252–257, 2009. View at Publisher · View at Google Scholar
  7. P.-Y. Lin, J.-S. Lee, and C.-C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition, vol. 42, no. 5, pp. 886–895, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  8. C.-C. Thien and J.-C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 12, pp. 1161–1169, 2003. View at Publisher · View at Google Scholar
  9. C.-C. Lin and W.-H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405–414, 2004. View at Publisher · View at Google Scholar
  10. C.-N. Yang, T.-S. Chen, K. H. Yu, and C.-C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, no. 7, pp. 1070–1076, 2007. View at Publisher · View at Google Scholar
  11. C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, no. 10, pp. 3130–3137, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  12. C.-C. Chen and W.-Y. Fu, “A geometry-based secret image sharing approach,” Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567–1577, 2008. View at Google Scholar
  13. H.-K. Tso, “Sharing secret images using Blakley's concept,” Optical Engineering, vol. 47, no. 7, Article ID 077001, 3 pages, 2008. View at Publisher · View at Google Scholar