{"title":"一种改进的隐写秘密图像共享方案","authors":"Yinping Chai","doi":"10.1109/MEC.2011.6025716","DOIUrl":null,"url":null,"abstract":"In order to adapt to the unreliable internet environment, the secret image sharing scheme must be able to recover the secret image when some shadows are lost, and the shadows shouldn't attract the attacker's attention when they are transmitted in the internet. Using (t, n)-threshold and steganography could realize the aims mentioned above. This article revised the wrong points in [13] and improved it. The new scheme utilized (t, n)-threshold to share the secret image and embedded the produced n shadows into different cover images, any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion. The experimental results show that the proposed scheme is feasible and effective.","PeriodicalId":386083,"journal":{"name":"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An improved secret image sharing scheme with steganography\",\"authors\":\"Yinping Chai\",\"doi\":\"10.1109/MEC.2011.6025716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to adapt to the unreliable internet environment, the secret image sharing scheme must be able to recover the secret image when some shadows are lost, and the shadows shouldn't attract the attacker's attention when they are transmitted in the internet. Using (t, n)-threshold and steganography could realize the aims mentioned above. This article revised the wrong points in [13] and improved it. The new scheme utilized (t, n)-threshold to share the secret image and embedded the produced n shadows into different cover images, any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion. The experimental results show that the proposed scheme is feasible and effective.\",\"PeriodicalId\":386083,\"journal\":{\"name\":\"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MEC.2011.6025716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MEC.2011.6025716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An improved secret image sharing scheme with steganography
In order to adapt to the unreliable internet environment, the secret image sharing scheme must be able to recover the secret image when some shadows are lost, and the shadows shouldn't attract the attacker's attention when they are transmitted in the internet. Using (t, n)-threshold and steganography could realize the aims mentioned above. This article revised the wrong points in [13] and improved it. The new scheme utilized (t, n)-threshold to share the secret image and embedded the produced n shadows into different cover images, any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion. The experimental results show that the proposed scheme is feasible and effective.