A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Analysis of Secret Image Sharing using Shared Image
2014
International Journal of Computer Applications
A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret image). A secret image is first processed into n shares which are then hidden in n user-selected suppression images. It is recommended to select
doi:10.5120/18926-0283
fatcat:ghykmuk2mja6tisbww5n7hupqa