Abstract—A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 1616 and divided into sixteen 44 blocks. Thus, we can embed 4(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved accord...
In cryptography, the art of secret sharing, is to share among a group of selected few an individual ...
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-...
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea th...
[[abstract]]Secret data delivery is an important research field in recent years because of the devel...
[[abstract]]Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utili...
[[abstract]]Secret information can be protected by using information hiding techniques. In this pape...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]The significant essential of secret image sharing approaches is that the revealed conten...
[[abstract]]This study proposes a new secret image sharing method based on the (t,n)-threshold. The ...
This paper presents a method for sharing and hiding secret images. The method is modi/ed from the (t...
[[abstract]]Verifiability is essential for a secret sharing approach which allows the involved parti...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
In secret image sharing schemes, the threshold may have to be adjusted in case of changes in the sec...
In cryptography, the art of secret sharing, is to share among a group of selected few an individual ...
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-...
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea th...
[[abstract]]Secret data delivery is an important research field in recent years because of the devel...
[[abstract]]Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utili...
[[abstract]]Secret information can be protected by using information hiding techniques. In this pape...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]Secret data delivery is an important application in the modern world. When sending secre...
[[abstract]]The significant essential of secret image sharing approaches is that the revealed conten...
[[abstract]]This study proposes a new secret image sharing method based on the (t,n)-threshold. The ...
This paper presents a method for sharing and hiding secret images. The method is modi/ed from the (t...
[[abstract]]Verifiability is essential for a secret sharing approach which allows the involved parti...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
In secret image sharing schemes, the threshold may have to be adjusted in case of changes in the sec...
In cryptography, the art of secret sharing, is to share among a group of selected few an individual ...
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-...
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea th...