We have located links that may give you full text access.
Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.
Gene Expression Patterns : GEP 2022 August 6
For (k, n)-threshold secret image sharing (SIS) scheme, only k or more than k complete parts can recover the secret information, and the correct image cannot be obtained if the count of shadow images is not enough or the shadow images are damaged. The existing schemes are weak in resisting large-area shadow image tampering. In this paper, we propose a robust secret image sharing scheme resisting to maliciously tampered shadow images by Absolute Moment Block Truncation Coding (AMBTC) and quantization (RSIS-AQ). The secret image is successively compressed in two ways: AMBTC and quantization. The sharing shadow images contain the sharing results of both compressed image from different parts, so that even the shadow images are faced with large-scale area of malicious tampering, the secret image can be recovered with acceptable visual quality. Compared with related works, our scheme can resist larger area of tampering and yield better recovered image visual quality. The experimental results prove the effectiveness of our scheme.
Full text links
Related Resources
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app
All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.
By using this service, you agree to our terms of use and privacy policy.
Your Privacy Choices
You can now claim free CME credits for this literature searchClaim now
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app