|
[BAO17]L. Bao, S. Yi, Y. Zhou, Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing, IEEE Transactions on Image Processing 26 (12) (2017) 5618–5631. [BENA86]J. C. Benaloh, Secret sharing homomorphisms: Keeping shares of a secret secret, in: Conference on the Theory and Application of Cryptographic Techniques, Springer, 251–260, 1986. [BHAT18]T. Bhattacharjee, S. P. Maity, S. R. Islam, Hierarchical secret image sharing scheme in compressed sensing, Signal Processing: Image Communication 61 (2018) 21–32. [BLAK79]G. R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 88, 317–317, 1979. [BRIC89]E.F. Brickell, “Some ideal secret sharing schemes,” Workshop on the Theory and Application of Cryptographic Techniques, Springer Berlin, Heidelberg, pp. 468-475, 1989. [CHAN08]C.-C. Chang, Y.-P. Hsieh, C.-H. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (10) (2008) 3130–3137. [ERSO16]O. Ersoy, K. Kaya, and K. Kaskaloglu, “Multilevel threshold secret and function sharing based on the Chinese Remainder Theorem,” arXiv preprintarXiv:1605.07988, 2016. [ESLA10]Z. Eslami, S. Razzaghi, J. Z. Ahmadabadi, Secret image sharing based on cellular automata and steganography, Pattern Recognition 43 (1) (2010) 397–404. [GHOD98]H. Ghodosi, J. Pieprzyk, and R. Safavi-Naini, “Secret sharing in multilevel and compartmented groups,” Australasian Conference on Information Security and Privacy, Springer Berlin Heidelberg, pp. 367-378, 1998. [GUO12]C. Guo, C.-C. Chang, C. Qin, A hierarchical threshold secret image sharing, Pattern Recognition Letters 33 (1) (2012) 83–91. [HARN14]L. Harn and F. Miao, “Multilevel threshold secret sharing based on the Chinese Remainder Theorem,” Information Processing Letters, Vol. 114, pp. 504-509, 2014. [HARN17a]L. Harn and C.F. Hsu, “A novel design of membership authentication and group key establishment protocol,” Security and Communication Networks, doi: 10.1155/2017/8547876, pp. 1-7, 2017. [HARN17b]L. Harn and C.F. Hsu, “A practical hybrid group key establishment for secure group communications,” The Computer Journal, Vol. 60, pp. 1582-1589, 2017. [HSU20]C. Hsu, L. Harn, and B. Zeng, “UMKESS: user-oriented multi-group key establishments using secret sharing,” Wireless Networks, Vol. 26, pp. 421-430, 2020. [KANS17]A. Kanso, M. Ghebleh, An efficient (t, n)–threshold secret image sharing scheme, Multimedia Tools and Applications 76 (15) (2017) 16369–16388. [LEE17]J.-S. Lee, Y.-R. Chen, Selective scalable secret image sharing with verification, Multimedia Tools and Applications 76 (1) (2017) 1–11. [LI07]H.X. Li, L.J. Pang, and W.D. Cai, “An efficient threshold multi-group-secret sharing scheme,” Fuzzy Information and Engineering (ICFIE), Vol. ASC-40, pp. 911-918, 2007. [LI16]P. Li, C.-N. Yang, Z. Zhou, Essential secret image sharing scheme with the same size of shadows, Digital Signal Processing 50 (2016) 51–60. [LI18]P. Li, Z. Liu, C.-N. Yang, A construction method of (t, k, n)-essential secret image sharing scheme, Signal Processing: Image Communication 65 (2018) 210–220. [LIU17]Y. Liu, C. Yang, Scalable secret image sharing scheme with essential shadows, Signal Processing: Image Communication 58 (2017) 49–55. [LIU18]Y.-x. Liu, C.-N. Yang, S.-y. Wu, Y.-s. Chou, Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes, Signal Processing: Image Communication 66 (2018) 77–86. [LIU19]Y.-X. Liu, C.-N. Yang, C.-M. Wu, Q.-D. Sun, W. Bi, Threshold changeable secret image sharing scheme based on interpolation polynomial, Multimedia Tools and Applications 78 (13) (2019) 18653–18667. [MENG19]K. Meng, F. Miao, W. Huang, and Y. Xiong, “Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem,” Discrete Applied Mathematics, Vol. 268, pp. 152-163, 2019. [NAOR95]M. Naor, A. Shamir, Visual cryptography, Lecture Notes in Computer Science 950 (1) (1995) 1–12. [PAKN14]N. Pakniat, M. Noroozi, Z. Eslami, Secret image sharing scheme with hierarchical threshold access structure, Journal of Visual Communication and Image Representation 25 (5) (2014) 1093–1101. [SHAM79]Shamir, How to share a secret, Communications of the ACM 22 (11) (1979) 612–613, ISSN 0001-0782. [THIE02]C.-C. Thien, J.-C. Lin, Secret image sharing, Computers & Graphics 26 (5) (2002) 765–770. [WU11]C.-C. Wu, S.-J. Kao, M.-S. Hwang, A high quality image sharing with steganography and adaptive authentication scheme, Journal of Systems and Software 84 (12) (2011) 2196–2207. [WU18a]X. Wu, C.-N. Yang, Y. T. Zhuang, S.-C. Hsu, Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Processing: Image Communication 66 (2018) 42–49. [WU18b]X. Wu, J. Weng, W. Yan, Adopting secret sharing for reversible data hiding in encrypted images, Signal Processing 143 (2018) 269–281. [WU19]X. Wu, C.-N. Yang, A combination of color-black-and-white visual cryptography and polynomial based secret image sharing, Journal of Visual Communication and Image Representation 61 (2019) 74–84. [WU20]Z. Wu, Y. Liu, X. Jia, A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management, Mathematics 8 (3) (2020) 448. [YAN18]X. Yan, Y. Lu, L. Liu, J. Liu, G. Yang, Chinese remainder theorem-based two-in-one image secret sharing with three decoding options, Digital Signal Processing 82 (2018) 80–90. [YAN19]X. Yan, Y. Lu, L. Liu, A general progressive secret image sharing construction method, Signal Processing: Image Communication 71 (2019) 66–75. [YANG07]C. Yang, T. Chen, K. Yu, C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and Software 80 (7) (2007) 1070–1076, ISSN 0164-1212. [YANG12]C.-N. Yang, J.-F. Ouyang, L. Harn, Steganography and authentication in image sharing without parity bits, Optics Communications 285 (7) (2012) 1725–1735. [ZARE16]J. Zarepour-Ahmadabadi, M. S. Ahmadabadi, A. Latif, An adaptive secret image sharing with a new bitwise steganographic property, Information Sciences 369 (2016) 467–480. |