Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

Reversible image secret sharing

X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …

Privacy-preserving in healthcare blockchain systems based on lightweight message sharing

J Fu, N Wang, Y Cai - Sensors, 2020 - mdpi.com
Electronic medical records (EMRs) are extremely important for patients' treatment, doctors'
diagnoses, and medical technology development. In recent years, the distributed healthcare …

A common method of share authentication in image secret sharing

X Yan, Y Lu, CN Yang, X Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …

A general progressive secret image sharing construction method

X Yan, Y Lu, L Liu - Signal Processing: Image Communication, 2019 - Elsevier
Classic secret image sharing (SIS) including polynomial-based SIS, visual secret sharing
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …

Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions

S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018 - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …

APCAS: Autonomous privacy control and authentication sharing in social networks

W Wen, J Fan, Y Zhang, Y Fang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, the increasing development of social networks has brought about many privacy-
related issues. Because users (participants) have different privacy sharing behaviors when …

Contrast optimization for size invariant visual cryptography scheme

X Wu, J Fang, WQ Yan - IEEE Transactions on Image …, 2023 - ieeexplore.ieee.org
Visual cryptography scheme (VCS) serves as an effective tool in image security. Size-
invariant VCS (SI-VCS) can solve the pixel expansion problem in traditional VCS. On the …

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options

X Yan, Y Lu, L Liu, J Liu, G Yang - Digital Signal Processing, 2018 - Elsevier
Two-in-one image secret sharing (ISS) with more decoding options has more applicable
scenarios than that with only one decoding option. Conventional two-in-one ISS methods …

Feature selection for image steganalysis using binary bat algorithm

F Liu, X Yan, Y Lu - IEEE Access, 2019 - ieeexplore.ieee.org
Steganography is to hide secret information in a normal cover, so that the secret information
cannot be detected. With the rapid development of steganography, it's more and more …