{"title":"An improved secret image sharing scheme with steganography","authors":"Yinping Chai","doi":"10.1109/MEC.2011.6025716","DOIUrl":null,"url":null,"abstract":"In order to adapt to the unreliable internet environment, the secret image sharing scheme must be able to recover the secret image when some shadows are lost, and the shadows shouldn't attract the attacker's attention when they are transmitted in the internet. Using (t, n)-threshold and steganography could realize the aims mentioned above. This article revised the wrong points in [13] and improved it. The new scheme utilized (t, n)-threshold to share the secret image and embedded the produced n shadows into different cover images, any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion. The experimental results show that the proposed scheme is feasible and effective.","PeriodicalId":386083,"journal":{"name":"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MEC.2011.6025716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In order to adapt to the unreliable internet environment, the secret image sharing scheme must be able to recover the secret image when some shadows are lost, and the shadows shouldn't attract the attacker's attention when they are transmitted in the internet. Using (t, n)-threshold and steganography could realize the aims mentioned above. This article revised the wrong points in [13] and improved it. The new scheme utilized (t, n)-threshold to share the secret image and embedded the produced n shadows into different cover images, any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion. The experimental results show that the proposed scheme is feasible and effective.