|
[BLAK79] G.R. Blakley, “Safeguarding Cryptographic Keys,” Proceedings of the AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317. [CHEN11] T.H. Chen, and K.H. Tsao, “Threshold visual secret sharing by random grids,” Journal of Systems and Software, vol. 84, pp. 1197–1208, 2011. [CHEN16] C.C. Chen, and S.C. Chen, “Two-layered structure for optimally essential secret image sharing scheme,” Journal of Visual Communication and Image Representation, vol. 38, pp.595–601, 2016. [GHEB17] M. Ghebleh, A. Kanso, “A novel secret image sharing scheme using large primes,” Multimedia Tools and Applications, vol.77, pp. 11903–11923, 2018. [HU19] Y.X. Hu, and Y.N. Liu, “A progressively essential secret image sharing scheme using hierarchy shadow,” Journal of Information Security and Applications, vol. 47, pp. 371–376, 2019. [JIA18] X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative visual cryptography schemes,” IEEE Transactions on Circuits and Systems for Video Technology. vol. 28, pp. 1056–1070, 2018. [JIA18] X. Jia, D. Wang, Q. Chu, and Z. Chen, “An efficient XOR-based verifiable visual cryptographic scheme,” Multimedia Tools and Applications, vol. 78, pp. 8207–8223, 2019. [KABI19] S. Kabirirad, and Z. Eslami, “Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations,” Journal of Information Security and Applications, vol. 47, pp.16–27, 2019. [KANS17] A. Kanso, and M. Ghebleh, “An efficient (t, n)–threshold secret image sharing scheme,” Multimedia Tools and Applications, vol. 76, pp. 16369–16388, 2017. [LI13] P. Li, C.N. Yang, C.C. Wu, Q. Kong, Y. Ma, “Essential secret image sharing scheme with different importance of shadows,” Journal of Visual Communication and Image Representation, vol. 24, pp. 1106–1114, 2013. [LIN03] C.C. Lin, and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, pp. 405–414, 2004. [LIN07] S.J. Lin, and J.C. Lin, “VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,” Pattern Recognition, vol. 40, pp. 3652–3666, 2007. [LIN10] Y.Y. Lin, and R.Z. Wang, “Scalable secret image sharing with smaller shadow images,” IEEE Signal Processing Letters, vol. 17, 316–319, 2010. [LIU10] F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptography schemes,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 27–38, 2010. [LIU17] Y. Liu, and C.N. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, vol. 58, pp. 49–55, 2017. [LIU18] Y. Liu, C.N. Yang, S. Wu, and Y. Chou, “Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes,” Signal Processing: Image Communication, vol. 66, pp. 77–86, 2018. [MEGH19] Y.K. Meghrajani, L.S. Desai, and H.S. Mazumdar, “Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share,” Journal of Information Security and Applications, vol. 47, pp. 267–74, 2019. [NAOR95] M. Naor, and A. Shamir, “Visual cryptography,” In: Proceedings of the Advances in Cryptology– EUROCRYPT’94, Lecture Notes in Computer Science, vol. 950, pp.1–12, 1995. [SHAM79] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, pp. 612–613, 1979. [SRIV16] S. Srividhya, R. Sathishkumar, and G.F. Sudha, “Implementation of tiOISSS with meaningful shadows and with an additional authentication image,” Journal of Visual Communication and Image Representation, vol. 38, pp. 284–296, 2016. [THIE02] C.C. Thien, and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, pp. 765–770, 2002. [THIE03] C.C. Thien, and J.C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 1161–1169. 2003. [WANG04] R.Z. Wang, and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, pp. 551–555, 2006. [WANG13] D.S. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal contrast grayscale visual cryptography schemes with reversing,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 2059–2072, 2013. [WEIR10] J. Weir, and W. Yan, “A comprehensive study of visual cryptography,” Transactions on Data Hiding and Multimedia Security V,” pp. 70–105, 2010. [WU14] X. Wu, and W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1592–1605, 2014. [WU18] X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving recovered image quality in secret image sharing by simple modular arithmetic,” Signal Processing: Image Communication, vol. 66, pp. 42–49, 2018. [WU19a] X. Wu, and Z.R. Lai, “Random grid based color visual cryptography scheme for black and white secret images with general access structures,” Signal Processing: Image Communication, vol. 75, pp.100–110, 2019. [WU19b] X. Wu, and C.N. Yang, “A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,” Journal of Visual Communication and Image Representation, vol. 61, pp. 74–84, 2019. [WU19c] X. Wu X, C.N. Yang, “Partial reversible AMBTC-based secret image sharing with steganography,” Digital Signal Processing, vol. 93, pp. 22–33, 2019. [WU19d] X. Wu, and C.N. Yang, “Invertible secret image sharing with steganography and authentication for AMBTC compressed images,” Signal Processing: Image Communication, vol. 78, pp. 437–447, 2019. [YAN17] X. Yan, and Y. Lu, “Contrast-improved visual secret sharing based on random grid for general access structure,” Digital Signal Processing, vol. 71, pp. 36–45,2017. [YAN19a] X. Yan, Y. Lu, and L. Liu, “A general progressive secret image sharing construction method,” Signal Processing Image Communication, vol. 71, pp. 66–75, 2019. [YAN19b] X. Yan, L. Liu, Y. Lu, Q. Gong, “Security analysis and classification of image secret sharing,” Journal of Information Security and Applications, vol. 47, pp. 208–16, 2019. [YANG04] C.N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, pp. 486–494, 2004. [YANG07] C.N. Yang, T.S. Chen, K.H. Yu, C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, pp. 1070–1076, 2007. [YANG10a] C.N. Yang, C.B. Ciou, “Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,” Image and Vision Computing, vol. 28, pp. 1600–1610, 2010. [YANG10b] C.N. Yang, and S.M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Optics Communications, vol. 283, pp. 1750–1762, 2010. [YANG11] C.N. Yang, and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems and Software, vol. 84 pp. 1726–1733, 2011. [YANG12] C.N. Yang, J.F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, vol. 285, pp. 1725–1735, 2012. [YANG15] C.N. Yang, P. Li, C.C. Wu, and S.R. Cai, “Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach,” Signal Processing: Image Communication, vol. 31, pp. 1–9, 2015. [ZHAO09] R. Zhao, J. Zhao, F. Dai, and F. Zhao, “A new image secret sharing scheme to identify cheaters,” Computer Standards & Interfaces, vol. 31, pp. 252–257, 2009. |