[1] A. Beimel. Secret-sharing schemes: A survey. In International Conference on Coding and Cryptology, pages 11–46, Berlin, Heidelberg, 2011. Springer. URL https://doi.org/10.1007/ 978-3-642-20901-7_2.
[2] T. Tassa. Hierarchical threshold secret sharing. Journal of Cryptology, 20:237–264, 2007. URL
https://doi.org/10.1007/s00145-0060334-8.
[3] I. Alam, A. S. Alali, S. Ali, and M. S. M. Asri. A verifiable multi-secret sharing scheme for hierarchical access structure. Axioms, 13(8): 515, 2024. URL https://doi.org/10.3390/ axioms13080515.
[4] A. Kaur, R. Kaur, and N. Kumar. A review on image steganography techniques. International Journal of Computer Applications, 123(4): 20–24, 2015. URL https://doi.org/10.5120/ ijca2015905280.
[5] A. Gutub and M. Al-Ghamdi. Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 79(11):7951–7985, 2020. URL
https://doi.org/10.1007/s11042-01908427-x.
[6] K. Gao, Y. Wang, H. Li, and L. Zhang. Steganographic secret sharing via ai-generated photorealistic images. EURASIP Journal on Wireless Communications and Networking, 2022(1): Article 190, 2022. URL https://doi.org/10. 1186/s13638-022-02190-8.
[7] M. Farhadi, H. Bypour, and R. Mortazavi. An efficient secret sharing-based storage system for cloud-based iots. In 2019 16th International ISC Conference on Information Security and Cryptology (ISCISC), pages 122–127, Mashhad, Iran, 2019. URL https://doi.org/10.1109/ ISCISC48546.2019.8985146.
[8] Z. I. Nezami, H. Ali, M. Asif, H. Aljuaid, I. Hamid, and Z. Ali. An efficient and secure technique for image steganography using a hash function. PeerJ Computer Science, 8(2):e1157, 2022.
[9] J. Chen, H. Deng, H. Su, M. Yuan, and Y. Ren. Lattice-based threshold secret sharing scheme and its applications: A survey. Electronics, 13 (2):287, 2024. URL https://doi.org/10.3390/ electronics13020287.
[10] H. Yang, Y. Xu, X. Liu, and X. Ma. Pris: Practical robust invertible network for image steganography. arXiv, 2023. URL
https://doi.org/10. 48550/arXiv.2309.13620.
[11] S. Atapoor, K. Baghery, D. Cozzo, and R. Pedersen. Vss from distributed zk proofs and applications. Technical Report 2023/992, Cryptology ePrint Archive, 2023. URL https://eprint. iacr.org/2023/992.
[12] P. Ji, Y. Zhang, and Z. Lv. Edge-guided dualstream u-net for secure image steganography. Applied Sciences, 15(8):4413, 2025. URL https: //doi.org/10.3390/app15084413.
[13] G. Li, S. Li, Z. Qian, and X. Zhang. Coverseparable fixed neural network steganography via deep generative models. In Proceedings of the 32nd ACM International Conference on Multimedia, pages 11719–11728, 2024.
[14] H. Zhou. Private neural network training with packed secret sharing. In Y. Chen, X. Gao, X. Sun, and A. Zhang, editors, Computing and Combinatorics: COCOON 2024, volume 15161 of Lecture Notes in Computer Science, pages 66–77. Springer, Singapore, 2025. URL https: //doi.org/10.1007/978-981-96-1090-7_6.
[15] Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub. High performance image steganography integrating iwt and hamming code within secret sharing. IET Image Processing, 18(1):129– 139, 2024. URL https://doi.org/10.1049/ ipr2.12938.
[16] C. C. Lin and W. H. Tsai. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3):405–414, 2004.
[17] Z. Eslami, S. H. Razzaghi, and J. Z. Ahmadabadi. Secret image sharing based on cellular automata and steganography. Pattern Recognition, 43(1):397–404, 2010. URL https://doi. org/10.1016/j.patcog.2009.06.007.
[18] P. Singh and N. Sharma. Authentication and integrity verification in secret sharing schemes using lattice-based digital signatures. IEEE Transactions on Dependable and Secure Computing, 2023. URL https://doi.org/10.1109/TDSC. 2023.3278491. Advance online publication.
[19] K. Wo´zniak, M. R. Ogiela, and L. Ogiela. A twophase embedding approach for secure distributed steganography. Sensors, 25(5):1448, 2025. URL
https://doi.org/10.3390/s25051448.
[20] V. Rajkumar, M. Prakash, and V. Vennila. Secure data sharing with confidentiality, integrity and access control in cloud environment. Computer Systems Science & Engineering, 40(2), 2022. URL https://doi.org/10.32604/CSSE. 2022.019622.
[21] W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2):331– 346, 2018.
[22] L. Chen, D. Moody, A. Regenscheid, and A. Robinson. Digital signature standard (dss). Technical report, NIST, 2023.
[23] Z. Chen, T. Liu, J.-J. Huang, W. Zhao, X. Bi, and M. Wang. Invertible mosaic image hiding network for very large capacity image steganography. arXiv, 2023. URL https://doi.org/10. 48550/arXiv.2309.08987.
[24] S. Sharma, S. Shivani, and N. Saxena. A selfauthenticating multi-tone secret sharing scheme using meaningful shares for satellite images. IEEE Access, 2024.
[25] J. E. Nalavade, A. Patil, A. Buchade, and N. Jadhav. Deep neural network and gan-based reversible data hiding in encrypted images: A privacy-preserving approach. SN Computer Science, 5(1):45, 2023. URL https://doi.org/10. 1007/s42979-023-02347-2.
[26] Y. Peng, Y. Wang, D. Hu, K. Chen, X. Rong, and W. Zhang. Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model. In Proceedings of the 32nd ACM International Conference on Multimedia, pages 3001–3009, 2024. URL https://doi.org/10. 1145/3581783.3612514.