|
[ABBO15]A.J. Abboud, “Protecting documents using visual cryptography,” Inter. J. of Eng. Res. and General Sci., vol. 3, pp. 464-470, 2015. [AHMA19]A.M. Ahmadian and M. Amirmazlaghani, “A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms,” Signal Processing: Image Comm., vol. 74, pp. 78-88, 2019. [ALTH16]I.A. Althamary and T.M. Alkharobi, “Secure file sharing in multi-clouds using Shamir’s secret sharing scheme,” Trans. on Networks and Communication, vol. 4, pp. 53-67, 2016. [BLAK79]G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference, vol. 48, pp. 313-317, 1979. [CHAN08]C.C. Chang, Y.P. Hsieh and C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [GUTT20]P. Guttikonda and N.B. Mundukur, “Polynomial-Based secret sharing scheme for text, image and audio,” J. Inst. Eng. India Ser. B, vol. 101, pp. 609-621, 2020. [JIA19]X. Jia, D. Wang, D. Nie, X. Luo, and J. Sun, “A new threshold changeable secret sharing scheme sased on the chinese remainder theorem,” Information Sciences, vol. 473, pp.13-30, 2019. [LEE12]C.W. Lee and W.H. Tsai, “A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability,” IEEE Trans. on Image Processing, vol. 21, pp. 207-218, 2012. [LEWA00]R. Lewand, “Cryptological mathematics,” Mathematical Association of America, 2000. [LI18]P. Li, Z. Liu and C.N. Yang, “A construction method of (t, k, n)-essential secret image sharing scheme,” Sig. Process.: Image Comm., vol. 65, pp.210-220, 2018. [LIU17]Y.X. Liu and C.N. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Comm., vol. 58, pp. 49-55, 2017. [LIU19a]Y.X. Liu, C.N. Yang, C.M. Wu, Q.D. Sun and W. Bi, “Threshold changeable secret image sharing scheme based on interpolation polynomial,” Multimedia Tools and App., vol. 78, pp. 8653-18667, 2019. [LIU19b]Y.X. Liu, Y.Z. Zhang, and C.N. Yang, “Reducing file size and time complexity in secret sharing based document protection,” Mathematical Biosciences and Engineering, vol.16, pp. 4802-4817, 2019. [LIU20]Y.X. Liu, C.N. Yang, and Q. Sun, “Thresholds based image extraction schemes in big data environment in intelligent traffic management,” IEEE Trans. on Intelligent Transportation Systems, vol. 22,pp. 3952-3960, 2020. [LUKA04]R. Lukac and K.N. Plutuniotis, “Document image secret sharing using bit-level processing,” 2004 International Conference on Image Processing, pp. 2983-2986, 2004. [SHAM79]A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, pp. 612-613, 1979. [SUN21]Y. Sun, Y. Lu, X. Yan, L. Liu, and L. Li, “Robust secret image sharing scheme against noise in shadow images,” IEEE Access, vol. 9, pp. 23284-23300, 2021. [THIE02]C.C. Thien and J.C. Lin, “Secret image sharing,” Computer & Graphics, vol. 26, pp. 765-770, 2002. [TU14]S.F. Tu and C.S. Hsu, “Protecting secret documents via a sharing and hiding scheme,” Information Sciences, vol. 279, pp.52-59, 2014. [WU18]X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving recovered image quality in secret image sharing by simple modular arithmetic,” Signal Processing: Image Comm., vol. 66, pp. 42-49, 2018. [WU19]X. Wu and C.N. Yang, “Invertible secret image sharing with steganography and authentication for AMBTC compressed images,” Signal Processing: Image Comm, vol. 78, pp. 437-447, 2019. [WU21]X. Wu, C.N. Yang, and J.M. Li, “Secure image secret sharing over distributed cloud network,” Signal Processing, vol. 178, Article 107768, 2021. [XION21a]L. Xiong, X. Zhong, C.N. Yang, and X. Han, “Transform domain-based invertible and lossless secret image sharing with authentication,” IEEE Trans. on Inf. Forensics and Sec., vol. 16, pp. 2912-2925, 2021. [XION21b]L. Xiong, X. Han, and C.N. Yang, “CP-PSIS: CRT and polynomial-based progressive secret image sharing,” Signal Processing, vol. 185, Article 108064, 2021. [YAN21]X. Yan, C.N. Yang, X. Zhang, and S. Wang, “A common method of share authentication in image secret sharing,” IEEE Trans. on Cir. and Sys. for Video Tech., vol. 31, pp. 2896-2908, July, 2021. [YANG07]C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, pp. 1070-1076, Jul., 2007. [YANG12]C.N. Yang, J.F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Comm., vol. 285, pp. 1725-1735, 2012. [YANG14]C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, “Secret image sharing without keeping permutation key,” 2014 International Conference Comm. Tec. (ICCT), pp. 410-416, 2014. [YANG21]C.N. Yang, X. Wu, H.Y. Lin, and C. Kim, “Intragroup and intergroup secret image sharing based on homomorphic lagrange interpolation,” Journal of Info. Sec. and App., vol. 61, Article 102910, 2021. [ZHOU18]Z. Zhou, C.N. Yang, Y. Cao, and X. Sun, “Secret image sharing based on encrypted pixels,” IEEE Access, vol. 6, pp. 15021-15025, Mar., 2018. |