Learn More
Secret image sharing approaches have been extended to obtain covers from stego images after the revealing procedure. Lin et al.'s work in 2009 uses modulus operator to decrease the share image distortion while providing recovery of original covers. Their work use gray level or binary image as cover. Stego images have approximately 43 dB and 38 dB PSNR for(More)
Medical applications such as telediagnosis require information exchange over insecure networks. Therefore , protection of the integrity and confidentiality of the medical images is an important issue. Another issue is to store electronic patient record (EPR) in the medical image by steganographic or watermarking techniques. Studies reported in the(More)
Digital images have been widely used in many applications. However, digital image forgery has already become a serious problem due to the rapid development of powerful image editing software. One of the most commonly used forgery techniques is Copy-move forgery that copies a region of an image and pastes it on the other region in the same image. In recent(More)
Visual secret sharing (VSS) is a method to scatter a secret image into shares of random patterns that have to be stacked together to reconstruct the secret. Since each share is a random pattern of black and white pixels, it is not enough to rebuild the secret from just one share. Stacking two shares reconstructs the first secret whereas rotating the first(More)
Secret Image Sharing is a technique to share the secret among n participants. Each participant has meaningless, noise like shares. The secret image is revealed if any k of the shares are gathered. This scheme uses polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2007, Chen et al. proposed a new secret image sharing method that(More)
With the rapid development of powerful image editing software, digital image forgery has been a serious problem. One of the most commonly used forgery technique is the Copy-move forgery that copies a part of an image and pastes it on the other region in the same image. Some methods in the literature divide suspicious image into overlapped blocks and extract(More)
Nowadays, image processing software has been improved progressively. Image modifications with unnoticed tricks are available via advanced software. There are many image tricky techniques and Copy-Move Forgery is the most extensive. It is called copy-move forgery when duplicated image region is pasted to another location in same image. In this study, image(More)