Vasif V. Nabiyev

Learn More
Medical applications such as telediagnosis require information exchange over insecure networks. Therefore, protection of the integrity and confidentiality of the medical images is an important issue. Another issue is to store electronic patient record (EPR) in the medical image by steganographic or watermarking techniques. Studies reported in the literature(More)
Secret image sharing approaches have been extended to obtain covers from stego images after the revealing procedure. Lin et al.’s work in 2009 uses modulus operator to decrease the share image distortion while providing recovery of original covers. Their work use gray level or binary image as cover. Stego images have approximately 43 dB and 38 dB PSNR for(More)
Visual Secret Sharing (VSS) is a method to encode a secret image into multiple shares. Coding one pixel of secret image into m sub-pixels in shares during encoding process causes pixel expansion problem. Probabilistic Visual Secret Sharing Scheme (PVSS) are proposed in recent years to overcome this problem. In traditional VSS and PVSS methods, human visual(More)
The Chinese Remainder Theorem (CRT) is used for secret sharing by both Mignotte and Asmuth Bloom in 1983. Then Shyu et al. used Mignotte's scheme in the field of secret image sharing in 2008. However, their method use a Pseudo Random Number Generator (PRNG) with a seed to generate different pixel values for the consecutive secret pixels that have the same(More)
Protection of the sensitive data is an important issue because of the fast development of applications that need exchange of the secret information over the Internet. Secret sharing is an idea proposed by Shamir and Blakley separately with different implementations in 1979. Lin and Tsai proposed a method that uses Steganography to create meaningful shares(More)
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another location to hide an object. The methods that are used to detect the copy move forgery in images have a drawback. Length of the feature vector that(More)
Secret Image Sharing is a technique to share the secret among n participants. Each participant has meaningless, noise like shares. The secret image is revealed if any k of the shares are gathered. This scheme uses polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2007, Chen et al. proposed a new secret image sharing method that(More)