|
[BLAK79]G.R. Blakley, “Safeguarding cryptographic keys,” Proceedings of the National Computer Conference, Vol. 88, pp. 317-317, 1979. [CHAN04]C.-K. Chan, L.-M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition Letters, Vol. 37, pp. 469-474, 2004. [CHEN16]C.-C. Chen, S.-C. Chen, “Two-layered structure for optimally essential secret image sharing scheme,” Journal of Visual Communication and Image Representation, Vol. 38, pp. 595-601, 2016. [GHEB18]M. Ghebleh, A. Kanso, “A novel secret image sharing scheme using large primes,” Multimedia Tools and Applications, Vol. 77, pp. 11903 - 11923, 2018. [KANS17]A. Kanso, M. Ghebleh, “An efficient (t, n)–threshold secret image sharing scheme,” Multimedia Tools and Applications, Vol. 76, pp. 16369 - 16388, 2017. [LI13]P. Li, C.-N. Yang, C.-C. Wu, Q. Kong, Y. Ma, “Essential secret image sharing scheme with different importance of shadows,” Journal of Visual Communication and Image Representation, Vol. 24, pp. 1106-1114, 2013. [LIN04]C.-C. Lin, W.-H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, Vol. 73, pp.405 - 414, 2004. [LIN07]S.-J. Lin, J.-C. Lin, “VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,” Pattern Recognition Letters, Vol. 40, pp. 3652-3666, 2007. [LIN10]Y.-Y. Lin, R.-Z. Wang, “Scalable secret image sharing with smaller shadow images,” IEEE Signal Processing Letter, Vol. 17, pp. 316-319, 2010. [LIU17]Y. Liu, C.-N. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, Vol. 58, pp. 49 - 55, 2017. [SHAM79]A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, pp. 612-613, 1979. [SRIV16]S. Srividhya, R. Sathishkumar, G.F. Sudha, “Implementation of tioisss with meaningful shadows and with an additional authentication image,” Journal of Visual Communication and Image Representation, Vol. 38, pp. 284-296, 2016. [THIE02]C.-C. Thien, J.-C. Lin, “Secret image sharing,” Computers & Graphics, Vol. 26, pp. 765-770, 2002. [THIE03]C.-C. Thien, J.-C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 1161-1169, 2003. [WANG06]R.-Z. Wang, C.-H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, Vol. 27, pp. 551 - 555, 2006. [YANG07]C. Yang, T. Chen, K. Yu, C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, Vol. 80, pp. 1070-1076, 2007. [YANG10-1]C.-N. Yang, S.-M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Optics Communications, Vol. 283, pp. 1750-1762, 2010. [YANG10-2]C.-N. Yang, C.-B. Ciou, “Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,” Image and Vision Computing, Vol. 28, pp. 1600–1610, 2010. [YANG11]C.-N. Yang, Y.-Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems and Software, Vol. 84, pp. 1726–1733, 2011. [YANG12]C.-N. Yang, J.-F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, Vol. 285, pp. 1725–1735, 2012. [YANG15]C.-N. Yang, P. Li, C.-C. Wu, S.-R. Cai, “Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach,” Signal Processing: Image Communication, Vol. 31, pp. 1-9, 2015. [ZHAO09]R. Zhao, J. Zhao, F. Dai, F. Zhao, “A new image secret sharing scheme to identify cheaters,” Computer Standards & Interfaces, Vol. 31, pp. 252-257, 2009.
|