|
[AHMA19]A.M. Ahmadian and M. Amirmazlaghani, “A novel secret imagesharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms,” SignalProcessing: Image Comm., vol. 74, pp. 78-88, 2019. [BLAK79]G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference,vol. 48, pp. 313-317, 1979. [CHAN08]C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing Secrets in StegoImages with Authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [CHEN16]C.C. Chen and S.C. Chen, “Two-layered Structure for OptimallyEssential Secret Image Sharing Scheme” Journal of Visual Communication and Image Representation, vol. 38, pp. 595-601,2016. [KANS17]A. Kanso and M. Ghebleh, “An Efficient (t, n)–threshold Secret Image Sharing Scheme,” Multimedia Tools and Appl., vol. 76, pp. 16369-16388, 2017. [LI13]P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential Secret Image Sharing Scheme with Different Importance of Shadows, Journal of Visual Communication and Image Representation, vol. 24, pp. 1106-1114, 2013. [LI16]P. Li, C.N. Yang, and Z. Zhou, “Essential Secret Image Sharing Scheme with the Same Size of Shadows,” Digital Signal Processing, vol. 50, pp. 51-60, 2016. [LIN04]C.C. Lin and W.H. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems & Software, vol. 73, pp. 405-414, 2004. [LIN21]Y.X. Liu, C.N. Yang, and Q. Sun, “Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management,”IEEE Trans. on Intelligent Trans. Sys., vol. 22, pp. 3952-3960, July 2021. [LIU17]Y.X. Liu and C.N. Yang, “Scalable Secret Image Sharing Scheme with Essential Shadows,” Signal Processing: Image Communication, vol.58, pp. 49-55, Oct., 2017. [SHAM79]A. Shamir, “How to Share A Secret,” Communications of the Association for Computing Machinery, vol. 22, pp. 612-613, 1979. [THIE02]C.C. Thien and J.C. Lin, “Secret Image Sharing,” Computers & Graphics, vol. 26, pp. 765-770, 2002. [WU11]C.C. Wu, S.J. Kao, and M.S. Hwang, “A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme, Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011. [WU18]X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving Recovered Image Quality in Secret Image Sharing by Simple Modular Arithmetic”, Signal Processing: Image Communication, vol. 66, pp. 42-49, 2018. [WU19a]Z. Wu, Y.N. Liu, D. Wang, and C.N. Yang, “An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial,”Symmetry, vol. 11, 69, 2019. [WU19b]X. Wu and C.N. Yang, Partial reversible AMBTC-based Secret Image Sharing with Steganography, Digital Signal Processing, vol. 93, pp. 22-33, 2019. [WU19c]X. Wu and C.-N. Yang, “Invertible Secret Image Sharing with Steganography and Authentication for AMBTC Compressed Images,” Signal Processing: Image Communication, vol. 78, pp. 437-447, 2019. [WU20]X. Wu, C.N. Yang, and Y.Y. Yang, “A Hybrid Scheme for Enhancing Recovered Image Quality in Polynomial Based Secret Image Sharing by Modify-and-Recalculate Strategy,” Journal of Information Security and Applications, vol. 51, Article 102452, 2020. [WU21]X. Wu, C.N. Yang, and J.M. Li, “Secure Image Secret Sharing over Distributed Cloud Network,” Signal Processing, vol. 178, Article 107768, 2021. [XION20]L. Xiong, X. Zhong, and C.N. Yang, “DWT-SISA: A Secure and Effective Discrete Wavelet Transform-based Secret Image Sharing with Authentication,” Signal Processing, vol. 173, Article 107571, 2020. [XION21a]L. Xiong, X. Zhong, C.N. Yang, and X. Han, “Transform Domainbased Invertible and Lossless Secret Image Sharing with Authentication,” IEEE Trans. on Info. Forensics and Security, vol. 16, pp. 2912-2925, 2021. [XION21b]L. Xiong et al., “RSIS: A Secure and Reliable Secret Image Sharing System based on Extended Hamming Codes in Industrial Internet of Things,” IEEE Internet of Things Journal (doi: 10.1109/JIOT.2021.3139657), 2021. [YANG07]C. Yang, T. Chen, K. Yu, and C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems and Software, vol. 80, pp. 1070-1076, 2007. [YANG12]C.-N. Yang, J.-F. Ouyang, and L. Harn, “Steganography and Authentication in Image Sharing without Parity Bits, Optics Communications, vol. 285, pp. 1725-1735, 2012. [YANG14]C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, “Secret Image Sharing without Keeping Permutation Key,” 2014 International Conference Comm. Tec. (ICCT), pp. 410-416, 2014. [YANG21a]C.N. Yang, X. Wu, H.Y. Lin, and C. Kim, “Intragroup and Intergroup Secret Image Sharing Based on Homomorphic Lagrange Interpolation,” Journal of Information Security and Applications, Vol. 61, Article 102910, 2021. [YANG21b]C.N. Yang, P.Y. Tsai, and Y.X. Liu, “A (k, n) Secret Document Sharing with Meaningful Shares,” Journal of Information Security and Applications, vol. 62, Article 102973, 2021. [YANG22]C.N. Yang, X. Wu, M.J. Chung, and X. Zhang, “Distortionless AMBTC-based Secret Image Sharing by Simple Modular Arithmetic,” Journal of Visual Communication and Image Representation, vol. 84, Article 103482, 2022. [ZHOU18]Z. Zhou, C.N. Yang, Y. Cao, and X. Sun, “Secret Image Sharing based on Encrypted Pixels,” IEEE Access, vol. 6, pp. 15021-15025, Mar., 2018. |