|
[AHMA19]AM Ahmadian AM and M.A. Amirmazlaghani, “A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms,” Signal Processing: Image Communication, vol. 74, pp. 78-88, 2019. [BAO17]L. Bao, S. Yi, Y. Zhou, “Combination of sharing matrix and image encryption for lossless (k, n)-secret image sharing,” IEEE Trans. on Image Processing, vol. 26, 5618-5631 2017. [CHAN08]C.C. Chang, Y.P. Hsieh, C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [CHEN16]C.C. Chen, S.C. Chen, “Two-layered structure for optimally essential secret image sharing scheme” Journal of Visual Communication and Image Representation, vol. 38, pp. 595-601, 2016. [DANG21]BS. Dang, M. Wen, S. Mumtaz, J. Li and C. Li, “Enabling multicarrier relay selection by sensing fusion and cascaded ANN for intelligent vehicular communications,” IEEE Sensors Journal, vol. 21, pp. 15614-15625, 2021. [ESLA10]Z. Eslami, S. Razzaghi, J. Z. Ahmadabadi, “Secret image sharing based on cellular automata and steganography,” Pattern Recognition, vol. 43, pp. 397-404, 2010. [KANS17]A. Kanso, M. Ghebleh, “An efficient (t, n)–threshold secret image sharing scheme,” Multimedia Tools and Appl., vol. 76, pp. 16369-16388, 2017. [LAM02]C.Y. Lam, G. Gong, and S. Vanstone, “Message authentication codes with error correcting capabilities,” The 4th International Conference on Information and Communications Security, pp. 354-366, 2002. [LI13]P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential secret image sharing scheme with different importance of shadows,” Journal of Visual Communication and Image Representation, vol. 24, pp. 1106-1114, 2013. [LI16]P. Li, C.N. Yang, Z. Zhou, “Essential secret image sharing scheme with the same size of shadows,” Digital Signal Processing, vol. 50, pp. 51-60, 2016. [LI19]X. Li et al., “Privacy preserving data aggregation scheme for mobile edge computing assisted IOT applications,” IEEE Internet of Things Journal, vol. 6, pp. 4755-4763, 2019. [LIN04]C.C. Lin and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems & Software, vol. 73, pp. 405-414, 2004. [LIU14]Y.X. Liu, C.N. Yang, P.H. Yeh, “Reducing shadow size in smooth scalable secret image sharing,” Security and Communication Networks, vol. 7, pp. 2237-2244, 2014. [LIU17a]Y.X. Liu and C.N. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, vol. 58, pp. 49-55, Oct., 2017. [LIU17b]Y. Liu, C. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, vol. 58, pp. 49-55, 2017. [LIU21]Y.X. Liu, C.N. Yang, and Q. Sun, “Thresholds based image extraction schemes in big data environment in intelligent traffic management,” IEEE Trans. on Intelligent Trans. Sys., vol. 22, pp. 3952-3960, July 2021. [PARA21]S. A. Parah et al., “Efficient security and authentication for edge-based internet of medical things,” IEEE Internet of Things Journal, vol. 8, pp. 15652-15662, 2021. [SHAM79]A. Shamir, “How to share a secret,” Communications of the ACM, vol. 2, pp. 612-613, 1979. [SUN21]Y. Sun et al., “Robust secret image sharing scheme against noise in shadow images,” IEEE Access, vol. 9, pp. 23284-23300, 2021. [THIE02]C.C. Thien and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, pp. 765-770, 2002. [WU11]C.C. Wu, S.J. Kao, M.S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,” Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011. [WU18]X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving recovered image quality in secret image sharing by simple modular arithmetic,” Signal Processing: Image Communication, vol. 66, pp. 42-49, 2018. [WU19a]Z. Wu, Y.N. Liu, D. Wang, and C.N. Yang, “An efficient essential secret image sharing scheme using derivative polynomial,” Symmetry, vol. 11, 69, 2019. [WU19b]X. Wu and C.N. Yang, “Partial reversible AMBTC-based secret image sharing with steganography,” Digital Signal Processing, vol. 93, pp. 22-33, 2019. [WU19c]X. Wu, C.-N. Yang, “Invertible secret image sharing with steganography and authentication for AMBTC compressed images,” Signal Processing: Image Communication, vol. 78, pp. 437-447, 2019. [WU20]X. Wu, C.N. Yang, and Y.Y. Yang, “A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy,” Journal of Information Security and Applications, vol. 51, Article 102452, 2020. [XION20]L. Xiong. X. Zhong, and C.N. Yang, “DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication,” Signal Processing, vol. 173, Article 107571, 2020. [XION21a]L. Xiong, X. Zhong, C.N. Yang, and X. Han, “Transform domain-based invertible and lossless secret image sharing with authentication,” IEEE Trans. on Info. Forensics and Security, vol. 16, pp. 2912-2925, 2021. [XION21b]L. Xiong et al., “RSIS: a secure and reliable secret image sharing system based on extended hamming codes in industrial internet of things,” IEEE Internet of Things Journal (doi: 10.1109/JIOT.2021.3139657), 2021. [YAN21]X. Yan et al., “Robust secret image sharing resistant to noise in shares,” ACM Trans. on Multimedia Computing, Communications, and Applications, vol. 17, Article 24, Apr. 2021. [YANG07]C. Yang, T. Chen, K. Yu, C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, pp. 1070-1076, 2007. [YANG10]C.N. Yang and S.M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Optics Communications, vol. 283, pp. 1750-1762, 2010. [YANG11]C.N. Yang and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems and Software, vol. 84, pp. 1726-1733, 2011. [YANG12]C.-N. Yang, J.-F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, vol. 285, pp. 1725-1735, 2012. [YANG14]C.N. Yang, W.J. Chang, and S.R. Cai, and C.Y. Lin, “Secret image sharing without keeping permutation key,” 2014 International Conference on Information and Communications Technologies, pp. 410-416, 2014. [YANG17]Y. Yang et al., “V2X security: a case study of anonymous authentication,” Pervasive and Mobile Computing, vol. 41, pp. 259-269, 2017. [YANG21]C.N. Yang, X. Wu, H.Y. Lin, and C. Kim, “Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation,” Journal of Information Security and Applications, Vol. 61, Article 102910, 2021. [ZHOU18]Z. Zhou Z, C.N. Yang, Y. Cao, and X. Sun, “Secret image sharing based on encrypted pixels,” IEEE Access, vol. 6, pp. 15021-15025, 2018. [ZHOU21]KB. Zhou et al., “Performance limits of visible light-based positioning for internet-of-vehicles: time-domain localization cooperation gain,” IEEE Trans. on Intelligent Transportation Systems, vol. 22, pp. 5374-5388, 2021. [ZRAR20]K. Zrar Ghafoor et al., “Millimeter-Wave communication for internet of vehicles: status, challenges, and perspectives,” IEEE Internet of Things Journal, vol. 7, pp. 8525-8546, 2020. |