Learn More
Secret image sharing approaches have been extended to obtain covers from stego images after the revealing procedure. Lin et al.'s work in 2009 uses modulus operator to decrease the share image distortion while providing recovery of original covers. Their work use gray level or binary image as cover. Stego images have approximately 43 dB and 38 dB PSNR for(More)
Medical applications such as telediagnosis require information exchange over insecure networks. Therefore , protection of the integrity and confidentiality of the medical images is an important issue. Another issue is to store electronic patient record (EPR) in the medical image by steganographic or watermarking techniques. Studies reported in the(More)
Creation and distribution of digital media has become part of daily life. Digital images are used in many fields but authenticity of an image is needed if it is used as evidence in a courtroom. Thus, development of techniques to ensure image authenticity is an active research topic. Passive methods make use of statistical features of images to judge(More)
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another location to hide an object. The methods that are used to detect the copy move forgery in images have a drawback. Length of the feature vector that(More)
— Visual Secret Sharing (VSS) is a method to encode a secret image into multiple shares. Coding one pixel of secret image into m sub-pixels in shares during encoding process causes pixel expansion problem. Probabilistic Visual Secret Sharing Scheme (PVSS) are proposed in recent years to overcome this problem. In traditional VSS and PVSS methods, human(More)
Visual secret sharing (VSS) is a method to scatter a secret image into shares of random patterns that have to be stacked together to reconstruct the secret. Since each share is a random pattern of black and white pixels, it is not enough to rebuild the secret from just one share. Stacking two shares reconstructs the first secret whereas rotating the first(More)
The Chinese Remainder Theorem (CRT) is used for secret sharing by both Mignotte and Asmuth Bloom in 1983. Then Shyu et al. used Mignotte's scheme in the field of secret image sharing in 2008. However, their method use a Pseudo Random Number Generator (PRNG) with a seed to generate different pixel values for the consecutive secret pixels that have the same(More)