JOURNAL ARTICLE

Secret image sharing scheme with adaptive authentication strength

Güzin UlutaşMustafa UlutaşVasif V. Nabiyev

Year: 2012 Journal:   Pattern Recognition Letters Vol: 34 (3)Pages: 283-291   Publisher: Elsevier BV
Keywords:
Steganography Computer science Block (permutation group theory) Authentication (law) Image sharing Secret sharing Hash function Block size Computer security Cryptography Theoretical computer science Image (mathematics) Mathematics Artificial intelligence Key (lock)

Metrics

42
Cited By
2.21
FWCI (Field Weighted Citation Impact)
18
Refs
0.89
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Secret Sharing Scheme with Fingerprint Authentication

A.P. SarangarajaD. RajagopalanA. VigneshP. Mohamed Fathimal

Journal:   Advances in science and technology Year: 2023 Vol: 124 Pages: 719-728
JOURNAL ARTICLE

Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention

Lina ZhangXuan DangFeng LiJunhan Yang

Journal:   Mathematical Problems in Engineering Year: 2021 Vol: 2021 Pages: 1-11
JOURNAL ARTICLE

Secret image sharing with steganography and authentication

Chang-Chou LinWen‐Hsiang Tsai

Journal:   Journal of Systems and Software Year: 2003 Vol: 73 (3)Pages: 405-414
JOURNAL ARTICLE

A Novel Scheme for Image Authentication and Secret Data Sharing

Auqib Hamid LoneAb Waheed LoneMoin Uddin

Journal:   International Journal of Computer Network and Information Security Year: 2016 Vol: 8 (9)Pages: 10-18
© 2026 ScienceGate Book Chapters — All rights reserved.