Mathematical Problems in Engineering
Volume 2009 (2009), Article ID 187874, 11 pages
http://dx.doi.org/10.1155/2009/187874
Research Article
Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Department of Computer Engineering, Karadeniz Technical University, 61080 Trabzon, Turkey
Received 13 April 2009; Revised 30 September 2009; Accepted 6 November 2009
Academic Editor: Panos Liatsis
Copyright © 2009 Mustafa Ulutas et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Linked References
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
- G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the National Computer Conference, pp. 313–317, New York, NY, USA, June 1979.
- C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 5, pp. 765–770, 2002. View at Publisher · View at Google Scholar
- R.-Z. Wang and C.-H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, no. 6, pp. 551–555, 2006. View at Publisher · View at Google Scholar
- C.-C. Chang, C.-C. Lin, C.-H. Lin, and Y.-H. Chen, “A novel secret image sharing scheme in color images using small shadow images,” Information Sciences, vol. 178, no. 11, pp. 2433–2447, 2008. View at Publisher · View at Google Scholar
- R. Zhao, J.-J. Zhao, F. Dai, and F.-Q. Zhao, “A new image secret sharing scheme to identify cheaters,” Computer Standards and Interfaces, vol. 31, no. 1, pp. 252–257, 2009. View at Publisher · View at Google Scholar
- P.-Y. Lin, J.-S. Lee, and C.-C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition, vol. 42, no. 5, pp. 886–895, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
- C.-C. Thien and J.-C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 12, pp. 1161–1169, 2003. View at Publisher · View at Google Scholar
- C.-C. Lin and W.-H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405–414, 2004. View at Publisher · View at Google Scholar
- C.-N. Yang, T.-S. Chen, K. H. Yu, and C.-C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, no. 7, pp. 1070–1076, 2007. View at Publisher · View at Google Scholar
- C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, no. 10, pp. 3130–3137, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
- C.-C. Chen and W.-Y. Fu, “A geometry-based secret image sharing approach,” Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567–1577, 2008. View at Google Scholar
- H.-K. Tso, “Sharing secret images using Blakley's concept,” Optical Engineering, vol. 47, no. 7, Article ID 077001, 3 pages, 2008. View at Publisher · View at Google Scholar