|
[HARN15] L. Harn and C.F. Hsu, Dynamic threshold secret reconstruction and its application to the threshold cryptography, ”Information Processing Letters,” vol. 115, pp. 851-857, 2015. [LAKH18] P. Lakhanpal and Prof. D. Agrawal, Enhanced secure mechanism for ARP poisoning and MITM attack, ”International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE),”vol. 6, 2018. [LAL17] S. Lal and Prof.S. Sharma, Load balancing and its challenges in cloud computing: A review paper, ”International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE),”vol. 5, 2017. [LE11] T.H.N. Le, C.C. Lin, C.C. Chang and H.B. Le,Ahigh quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images, ”Digital Signal Processing,”vol. 21, pp. 734-745, 2011. [LEE15] J.S. Lee, C.C. Chang, N.T. Huynh and H.Y. Tsai, Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique, ”Digital Signal Processing,”vol. 40, pp.131-139, 2015. [LI16] P. Li, C.N. Yang and Z. Zhou, Essential secret image sharing scheme with the same size of shadows, ”Digital Signal Processing,” vol 50, pp. 51-60, 2016. [LI18] P. Li, Z. Liu and C.N.A. Yang, Construction Method of (t, k, n)- essential secret image sharing scheme, ”Signal Processing: Image Communication,” vol. 65, pp. 210-220, 2018. [LIN10] Y.Y. Lin and R.Z.Wang, Scalable secret image sharing with smaller shadow images, ”IEEE Signal Processing Letters,”vol. 17, pp. 316-319, 2010. [LIU14] Y.X. Liu, C.N. Yang and P.H. Yeh, Reducing shadow size in smooth scalable secret image sharing, ”Security and Communication Networks,”vol. 7, pp. 2237-2244, May, 2014. [LIU17] L.T. Liu, Y.L. Lu, X.H. Yan and H.X. Wan, Greyscaleimages-oriented progressive secret sharing based on the linear congruence equation,” Multimedia Tools and Applications,”vol. 2, pp. 1-28, 2017. [LIU18] Y.X. Liu, C.N. Yang, S.Y. Wu and Y.S. Chou, Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes,” Signal Processing: Image Communication,”vol. 66, pp. 77-86, 2018. [LIU19] Y.X. Liu, C.N. Yang, C.M. Wu, Q.D. Sun and W. Bi, Threshold changeable secret image sharing scheme based on interpolation polynomial, Cheating Prevention in Visual Cryptography, “Multimedia tools and Applications,”vol. 78, pp. 18653-18667, 2019. [MAHE17] S. Maheswari and K. Chitra, A novel approach for software defect prediction using learning algorithms, ” International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”, vol. 5, , 2017. [NAOR95] M. Naor and A. Shamir, Visual cryptography, ”Proc of EUROCRYPT 1994,”LNCS 950, pp. 1-12, 1995. [SHYU13] S.J. Shyu and H.W. Jiang, General constructions for threshold multiple-secret visual cryptography Schemes, ”IEEE Transactions on Information Forensics and Security,”vol. 2, pp. 733-743, 2013. [THIE02] C.C. Thien and J.C. Lin, Secret image sharing General k, ”Computers and Graphics,”vol. 26, pp. 765-770, 2002. [WANG06] R.Z. Wang and C.H. Su, Secret image sharing with smaller shadow images, ”Pattern Recognition Letters”, vol. 27, pp. 551-555, 2006. [WANG07] R.Z. Wang and S.J. Shyu, Scalable secret image sharing, ”Signal Processing: Image Communication,”vol. 22, pp. 363-373, 2007. [WU11] C.C. Wu, S.J. Kao and M.S. Hwang, A high quality image sharing with steganography and adaptive authentication scheme, ”Journal of Systems and Software,”vol. 84, pp. 2196-2207, 2011. [YAN18] X.Yan,Y. Lu, L. Liu, J. Liu and G.Yang, Chinese remainder theorem-based two-in-one image secret sharing with three decoding options,” Digital Signal Processing,”vol. 82, pp. 80-90, 2018. [YANG10] C.N. Yang and S.M. Huang, Constructions and properties of k out of n scalable secret image sharing, ”Optics Communications,”vol. 283, pp. 1750-1762, 2010. [YANG11] C.N. Yang and Y.Y. Chu, A general (k, n) scalable secret image sharing scheme with the smooth scalability, ”Journal of Systems and Software,” vol. 84, pp. 1726-1733, 2011. [YANG12] C.N. Yang, H.W. Shih, C.C. Wu and L. Harn, K out of n region incrementing scheme in visual cryptography, ”IEEE Transactions on Circuits and Systems for Video Technology”, vol. 22, pp. 799-809, 2012. [YANG13] C.N. Yang, Y.C. Lin and C.C. Wu, Region in region incrementing visual cryptography scheme, ”Proc IWDW2012”, LNCS 7809, pp.449-463, 2013. [YANG14] C.N. Yang and Y.Y. Yang, New extended visual cryptography schemes with clearer shadow images, ”Information Sciences,”vol. 271, pp. 246-263,2014 [YANG15] C.N. Yang, P. Li, C.C. Wu and S.R. Cai, Reducing shadow size in sssential secret image sharing by conjunctive herarchical approach, ”Signal Processing: Image Communication”, vol. 31, pp. 1-9, 2015. [YANG17] Y.X. Liu and C.N. Yang, Scalable secret image sharing scheme with essential shadows, ” Signal Processing: Image Communication”, vol. 58, pp. 49−55, 2017. [YUAN16] L. Yuan, M. Li, C. Guo, K.-K.R. Choo and Y. Ren, Novel threshold changeable secret sharing schemes based on polynomial interpolation,” PloS One,”vol.11, pp. 1-19, 2016. [ZHAN12] Z. Zhang, Y.M. Chee, S. Ling, M. Liu and H. Wang, Threshold changeable secret sharing schemes revisited, ”Theoretical Computer Science,”vol. 418, pp. 106-115, 2012.
|