25.3.11.8 Image Hiding, Data Hiding, Steganography with Shadow Images

Chapter Contents (Back)
Steganography. Image Compression. Shadow Images.

Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
Elsevier DOI 0402
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
Elsevier DOI 0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI 0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI 0509
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
Elsevier DOI 0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI 0610
Visual secret sharing; Visual cryptography; Secret image sharing BibRef

Wang, R.Z.[Ran-Zan], Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI 0604
BibRef

Wang, R.Z.[Ran-Zan], Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
Elsevier DOI Secret sharing; Image sharing; Shadow image; Data hiding 0604
BibRef

Lin, Y.Y.[Yung-Yi], Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI 1001
BibRef

Wang, R.Z.[Ran-Zan], Chien, Y.F.[Yin-Fang], Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI 1003
Image sharing; Secret sharing; Secret image sharing; User-friendly shadow image; Progressive reconstruction; Scalable sharing; Visual cryptography; Visual secret sharing BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
Elsevier DOI 0310
BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract. 0402
BibRef

Li, P.[Peng], Ma, J.F.[Jian-Feng], Ma, Q.[Quan],
(t, k, n) XOR-based visual cryptography scheme with essential shadows,
JVCIR(72), 2020, pp. 102911.
Elsevier DOI 2010
XOR operation, Essential participants, Visual cryptography, Secret image sharing BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng],
Essential secret image sharing scheme with different importance of shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI 1309
Secret sharing BibRef

Li, P.[Peng], Liu, Z.Q.[Zu-Quan], Yang, C.N.[Ching-Nung],
A construction method of (t,k,n)-essential secret image sharing scheme,
SP:IC(65), 2018, pp. 210-220.
Elsevier DOI 1805
BibRef
Earlier: A1, A2, Only:
A Novel Visual Cryptography Scheme with Different Importance of Shadows,
IWDW17(365-377).
Springer DOI 1708
Secret image sharing, Secret sharing, Essential shadows, Lagrange interpolation. BibRef

Li, P.[Peng], Yin, L.P.[Li-Ping], Ma, J.F.[Jian-Feng], Wang, H.T.[Hong-Tao],
XOR-based visual cryptography scheme with essential shadows,
JVCIR(85), 2022, pp. 103513.
Elsevier DOI 2205
XOR operation, Essential shadows, Visual cryptography, Secret image sharing, Shadow image, Access structure partition BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung],
Scalable secret image sharing scheme with essential shadows,
SP:IC(58), No. 1, 2017, pp. 49-55.
Elsevier DOI 1710
Secret image sharing BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung], Chou, Y.S.[Yung-Shun], Wu, S.Y.[Song-Yu], Sun, Q.D.[Qin-Dong],
Progressive (k,n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD,
JVCIR(55), 2018, pp. 766-777.
Elsevier DOI 1809
Progressive secret sharing scheme, Meaningful shadow image, GEMD, RGEMD BibRef

Yang, C.N.[Ching-Nung], Li, P.[Peng], Wu, C.C.[Chih-Cheng], Cai, S.R.[Song-Ruei],
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach,
SP:IC(31), No. 1, 2015, pp. 1-9.
Elsevier DOI 1502
Secret sharing BibRef

Srividhya, S., Sathishkumar, R., Sudha, G.F.[Gnanou Florence],
Implementation of TiOISSS with meaningful shadows and with an additional authentication image,
JVCIR(38), No. 1, 2016, pp. 284-296.
Elsevier DOI 1605
Two in One Image Secret Sharing Scheme. Visual cryptography BibRef

Yan, X.H.[Xue-Hu], Gong, Q.H.[Qing-Hong], Li, L.L.[Long-Long], Yang, G.Z.[Guo-Zheng], Lu, Y.L.[Yu-Liang], Liu, J.J.[Jing-Ju],
Secret image sharing with separate shadow authentication ability,
SP:IC(82), 2020, pp. 115721.
Elsevier DOI 2001
Secret image sharing, Shadow authentication, Pixel expansion, Lossless recovery BibRef

Sardar, M.K.[Md Kutubuddin], Adhikari, A.[Avishek],
Essential secret image sharing scheme with small and equal sized shadows,
SP:IC(87), 2020, pp. 115923.
Elsevier DOI 2007
Grayscale image, Finite field, -threshold secret sharing scheme BibRef


Wang, X.F.[Xiao-Feng], Li, Z.[Zhen], Zhang, X.[Xiaoni], Wang, S.P.[Shang-Ping], Chen, J.[Jing],
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images,
IWDW11(425-438).
Springer DOI 1208
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Surveys, Image Hiding, Data Hiding, Steganography .


Last update:Apr 6, 2026 at 11:28:57