|
[SHAM82]A. Shamir, How to share a secret, Commun. vol. 22, pp. 612-613, 1979 [BLAK79]G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 88, pp. 317, 1979. [ASMU83]C. Asmuth, and J. Bloom, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, vol. 29, pp.08–210, 1983. [DUAN20]J. Duan, J. Zhou, and Y. Li, Privacy-preserving distributed deep learning based on secret sharing, Inf. Sci. Vol. 527, pp.108–127, 2020. [YAN21]X. Yan, J. Li, Z. Pan, and X. Zhong, G. Yang, Multiparty verification in image secret sharing, Inf. Sci. Vol. 562, pp.475–490, 2021. [WU22]X. Wu, and X. Zhang, Towards cheat-preventing in block-based progressive visual cryptography for general access structures, Inf. Sci. Vol.583, pp.73–98, 2022. [THIE02]C.C. Thien, and J.C. Lin, Secret image sharing, Comput. Graph. Vol. 26, pp.765–770, 2002. [LIN04]C. Lin, and W. Tsai, Secret image sharing with steganography and authentication, J. Syst. Softw. Vol.73, pp.405–414, ISSN 0164-1212, 2004. [YANG07]C. Yang, T. Chen, K. Yu, and C. Wang, Improvements of image sharing with steganography and authentication, J. Syst. Softw. Vol. 80, pp.1070–1076, 2007. [CHAN08]C.C. Chang, Y.P. Hsieh, and C.H. Lin, Sharing secrets in stego images with authentication, Pattern Recognit. Vol. 41, pp.3130–3137, 2008 [WU11]C.C. Wu, S.J. Kao, and M.S. Hwang, A high quality image sharing with steganography and adaptive authentication scheme, J. Syst. Softw. Vol. 84, pp.2196–2207, 2011. [YANG12]C.N. Yang, J.F. Ouyang, and L. Harn, Steganography and authentication in image sharing without parity bits, Opt. Commun. Vol. 285, pp.1725–1735, 2012. [YANG13]P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, Essential secret image sharing scheme with different importance of shadows, J. Vis. Commun. Image Represent. Vol. 24, pp.1106–1114, 2013. [CHEN16]C.C. Chen, and S.C. Chen, Two-layered structure for optimally essential secret image sharing scheme, J. Vis. Commun. Image Represent. Vol. 38, pp.595–601, 2016. [LI16]P. Li, C.N. Yang, and Z. Zhou, Essential secret image sharing scheme with the same size of shadows, Digit. Signal Process. Vol. 50, pp.51–60, 2016. [LIU17]Y. Liu, and C. Yang, Scalable secret image sharing scheme with essential shadows, Signal Process. Vol. 58, pp.49–55, 2017. [KANS17]A. Kanso, and M. Ghebleh, An efficient (t, n)–threshold secret image sharing scheme, Multimed. Tools Appl. Vol. 76, pp.16369–16388, 2017. [WU19a]Z. Wu, Y.N. Liu, D. Wang, and C.N. Yang, An efficient essential secret image sharing scheme using derivative polynomial, Symmetry 11 Vol. 69, 2019. [WU19b]X. Wu, and C.N. Yang, Partial reversible AMBTC-based secret image sharing with steganography, Digit. Signal Process. Vol. 93, pp22–33, 2019. [WU19c]X. Wu, and C.N. Yang, Invertible secret image sharing with steganography and authentication for ambtc compressed images, Signal Process. Vol. 78, pp.437–447, 2019. [XION20]L. Xiong, X. Zhong, and C.N. Yang, DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication, Signal Process. Vol. 173, pp. 107571, 2020. [XION21a]L. Xiong, X. Zhong, C.-N. Yang, and X. Han, Transform domain-based invertible and lossless secret image sharing with authentication, IEEE Trans. Inf. Forensics Secur. Vol. 16, pp.2912–2925, 2021. [WU21]X. Wu, C.N. Yang, and J.M. Li, Secure image secret sharing over distributed cloud network, Signal Process. Vol. 178, pp.107768, 2021. [YANG21a]Yang, X. Wu, H.Y. Lin, and C. Kim, Intragroup and intergroup secret image sharing based on homomorphic lagrange interpolation, J. Inf. Secur. Appl. Vol.61, pp.102910, 2021. [YANG22]C.N. Yang, X. Wu, M.-J. Chung, and X. Zhang, AMBTC-based secret image sharing by simple modular arithmetic, J. Vis. Commun. Image Represent. Vol. 84, pp.103482, 2022. [LIU20]Y. Liu, C. Yang, and Q. Sun, Thresholds based image extraction schemes in big data environment in intelligent traffic management, IEEE Trans. Intell. Transp. Syst. Vol. 22, pp.3952–3960, 2020. [XION21b]L. Xiong, X. Han, X. Zhong, C.N. Yang, and N.N. Xiong, RSIS: a secure and reliable secret image sharing system based on extended hamming codes in industrial internet of things, IEEE Internet Things J. doi:10.1109/JIOT.2021.3139657, 2021. [YANG14]C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, Secret image sharing without keeping permutation key, in: 2014 International Conference on Information and Communications Technologies, IET, pp. 3.087–3.087, 2014. [ZHOU18]Z. Zhou, C.N. Yang, Y. Cao, and X. Sun, Secret image sharing based on encrypted pixels, IEEE Access 6, pp.15021–15025, 2018. [AHMA19]A.M. Ahmadian, and M. Amirmazlaghani, A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms, Signal Process. Image Commun. Vol. 74, pp.78–88, 2019. [WU18]X. Wu, C.N. Yang, and Y.T. Zhuang, S.C. Hsu, Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process. Vol. 66, pp.42–49, 2018. [WU20]X. Wu, C.N. Yang, and Y.Y. Yang, A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy, J. Inf. Secur. Appl. Vol. 51, pp.102452, 2020. [CHU11]C.N. Yang, and Y.Y. Chu, A general (k, n) scalable secret image sharing scheme with the smooth scalability, J. Syst. Softw. Vol. 84, pp.1726–1733, 2011. [LIU14]Y.-X. Liu, C.N. Yang, and P.H. Yeh, Reducing shadow size in smooth scalable secret image sharing, Secur. Commun. Netw. Vol. 7, pp.2237–2244, 2014. [LEE17]J.S. Lee, and Y.R. Chen, Selective scalable secret image sharing with verification, Multimed. Tools Appl. Vol. 76, pp.1–11, 2017. [GUO19]Y. Guo, Z. Ma, and M. Zhao, Polynomial based progressive secret image sharing scheme with smaller shadow size, IEEE Access 7, pp.73782–73789, 2019. [YAN19]X.Y. Yan, Y. Lu, and L. Liu, A general progressive secret image sharing construction method, Signal Process. Vol. 71, pp.66–75, 2019. [LIU20]Y.X. Liu, C.N. Yang, Q.D. Sun, and Y.C. Chen, (k, n) scalable secret image sharing with multiple decoding options, J. Intell. Fuzzy Syst. Vol. 38, pp.219–228, 2020. [YAN18]X. Yan, Y. Lu, L. Liu, J. Liu, and G. Yang, Chinese remainder theorem-based two-in-one image secret sharing with three decoding options, Digit. Signal Process. Vol. 82, pp.80–90, 2018. [TAN19]L. Tan, Y. Lu, X. Yan, L. Liu, and L. Li, Weighted secret image sharing for a (k, n) threshold based on the chinese remainder theorem, IEEE Access 7, pp.59278–59286, 2019. [LIU20]Y.x. Liu, C.N. Yang, S.y. Wu, and Y.s. Chou, Progressive (k, n) secret image sharing schemes based on boolean operations and covering codes, Signal Process. Vol. 66, pp.77–86, 2018. [LIU18]Y.X. Liu, C.N. Yang, Y.S. Chou, S.Y. Wu, and Q.D. Sun, Progressive (k, n) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD, J. Vis. Commun. Image Represent. Vol. 55, pp.766–777, 2018. [XION21c]L. Xiong, X. Han, C.N. Yang, CP-PSIS: CRT and polynomial-based progressive secret image sharing, Signal Process. Vol. 185, pp.108064, 2021. [YANG21b]C.N. Yang, P.Y. Tsai, and Y. Liu, A (k, n) secret document sharing with meaningful shares, J. Inf. Secur. Appl. Vol. 62, pp.102973, 2021.
|