|
[CHAN08] C.C. Chang, Y.P. Hsieh, C.H. Lin, “Sharing Secrets in Stego Images with Authentication, Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [CHEN17] Y.C. Chen, “Fully Incrementing Visual Cryptography from a Succinct Non-monotonic Structure,” IEEE Trans. on Inform. Forensics Sec., vol. 12, pp. 1082-1091, 2017. [CIMA06] S. Cimato, R. De Prisco, and A. De Santis, “Probabilistic Visual Cryptography Schemes,” The Com. Journal, vol. 49, pp.97-107, 2006. [CIMA11] S. Cimato and C. N. Yang, Visual Cryptography and Secret Image Sharing, Boca Raton, FL, USA: CRC Press, 2011. [JIA18] X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative Visual Cryptography Schemes,” IEEE Trans. Circuits Syst. Video Technol., vol. 28, pp. 1056-1070, 2018. [LI12] P. Li, P.-J. Ma, X.-H. Su, C.-N. Yang, Improvements of a Two-in-One Image Secret Sharing Scheme Based on Gray Mixing Model, Journal of Visual Comm. and Image Rep., vol. 23, pp. 441-453, 2012. [LI13] P. Li, C.-N. Yang, Q. Kong, Y. Ma, Z. Liu, “Sharing More Information in Gray Visual Cryptography Scheme,” Journal of Visual Comm. and Image Rep., vol. 24, pp. 1380-1393, 2013. [LI16] P. Li, C.N. Yang, Z. Zhou, Essential Secret Image Sharing Scheme with the Same Size of Shadows, Digital Sig. Process., vol.50, 51-60, 2016. [LI18] P. Li, Z. Liu, C.N. Yang, A Construction Method of (t, k, n)-essential Secret Image Sharing Scheme, Sig. Process.: Image Comm., vol. 65, 210-220, 2018. [LIN07] S.J. Lin and J.C. Lin, “VCPSS: A Two-in-One Two-Decoding-Options Image Sharing Method Combining Visual Cryptography (VC) and Polynomial-Style Sharing (PSS) Approaches,” Pattern Recognition, vol. 40, pp. 3652-3666, 2007. [LIU17] Y. Liu, C. Yang, Scalable Secret Image Sharing Scheme with Essential Sshadows, Sig. Process.: Image Comm., vol. 58, pp. 49-55, 2017. [LIU19] Y.X. Liu, C.N. Yang, C.M. Wu, Q.D. Sun, W. Bi, “Threshold Changeable Secret Image Sharing Scheme Based on Interpolation Polynomial,” Multimedia Tools and App., vol. 78, pp. 8653-18667, 2019. [NAOR95] M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology-EUROCRYPT’ 94, vol. LNCS 950, pp.1-12, 1995. [PRIS13] R. De Prisco and A. De Santis, “Color Visual Cryptography Schemes for Black and White Secret Images,” Theoretical Computer Sci. vol. 510, pp. 62-86, 2013. [SHAM79] A. Shamir, “How to Share A Secret, Comm. ACM, vol. 22, pp. 612-613, 1979. [SHYU09] S.J. Shyu, “Image Encryption by Multiple Random Grids, Pattern Recognition, vol. 42, pp. 1582-1596, 2009. [SHYU12] S.J. Shyu and H.W. Jiang, “Efficient Construction for Region Incrementing Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology IEEE Trans. Circuits Syst. Video Technol., vol. 22, pp. 769-777, 2012. [SHYU13] S.J. Shyu and H.W. Jiang, “General Constructions for Threshold Multiple-Secret Visual Cryptography Schemes,” IEEE Trans. on Inform. Forensics Sec., vol. 8, pp. 733-743, 2013. [THIE02] C.C. Thien and J.C. Lin, “Secret Image Sharing,” Computer & Graphics, vol. 26, pp. 765-770, 2002. [VERH97] E.R Verheul and H.C.A Van Tilborg, “Constructions and Properties of k out of n Visual Secret Sharing Scheme,” Designs, Codes and Cryptography, vol. 1, pp. 179-196, 1997. [WU18] X. Wu, C.N. Yang, Y.T. Zhuang, S.C. Hsu, Improving Recovered Image Quality in Secret Image Sharing by Simple Modular Arithmetic, Sig. Process.: Image Comm. vol. 66, pp. 42-49, 2018. [WU19a] X. Wu and C.N. Yang, “Invertible Secret Image Sharing with Steganography and Authentication for AMBTC Compressed Images,” Sig. Process.: Image Comm., vol. 78, pp. 437-447, 2019. [WU19b] X. Wu and C.N. Yang, “A Combination of Color-Black-and-White Visual Cryptography and Polynomial Based Secret Image Sharing,” Journal of Visual Comm. Image Rep., vol. 61, pp. 74-84, 2019. [WU20] X. Wu and C.N. Yang, “Probabilistic Color Visual Cryptography Schemes for Black and White Secret Images,” Journal of Visual Comm. and Image Rep., Vol. 70, Article 102793, July, 2020. [YAN15] X. Yan, S. Wang, X. Niu, and C.N. Yang, “Generalized Random Grids-based Threshold Visual Cryptography with Meaningful Shares,” Signal Processing, vol. 109, pp. 317-333, 2015. [YAN21] X. Yan, C.N. Yang, X. Zhang, and S. Wang, “A Common Method of Share Authentication in Image Secret Sharing,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, pp. 2896-2908, 2021. [YANG04] C. N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, vol. 25, pp. 481-494, 2004. [YANG07] C. Yang, T. Chen, K. Yu, C. Wang, Improvements of Image Sharing with Steganography and authentication,” Journal of Sys. and Sof., vol. 80, pp. 1070-1076, 2007. [YANG08] C.N. Yang and T.S. Chen, “Colored Visual Cryptography Scheme Based on Additive Color Mixing,” Pattern Recognition, vol. 41, pp. 3114-3129, 2008. [YANG10] C.N. Yang and C.B. Ciou, “Image Secret Sharing Method with Two-decoding Options: Lossless Recovery and Previewing Capability,” Image and Vision Comp., vol. 28, pp. 1600-1610, 2010. [YANG12a] C.N. Yang, H.W. Shih, and L. Harn, “k out of n Region Incrementing Scheme in Visual Cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 22, pp. 799-810, 2012. [YANG12b] C.-N. Yang, J.-F. Ouyang, L. Harn, Steganography and Authentication in Image Sharing without Parity Bits, Optics Comm., vol. 285, pp. 1725-1735, 2012. [YANG14a] C.N. Yang, C.C. Wu, and D. Wang, “A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid,” Information Sciences, vol. 278, pp. 141-173, 2014. [YANG14b] C.N. Yang and D. Wang, “Property Analysis of XOR Based Visual Cryptography,” IEEE Trans. on Circuits and Syst. for Video Technol., vol. 24, pp. 189-197, 2014. [YANG16] C.N. Yang, L.Z. Sun, and S.R. Cai, “Extended Color Visual Cryptography for Black and White Secret Image,” Theoretical Computer Sci., vol. 609, pp. 143-161, 2016. [YANG19] C.N. Yang, C.C. Wu, Y.C. Lin, “k out of n Region-based Progressive Visual Cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, pp. 252-262, 2019. [YANG21a] C.N. Yang, X. Wu, H.Y. Lin, and C. Kim, “Intragroup and Intergroup Secret Image Sharing Based on Homomorphic Lagrange Interpolation,” Journal of Info. Sec. and App., vol. 61, Article 102910, 2021. [YANG21b] C.N. Yang and Y.Y. Yang, “On the Analysis and Design of Visual Cryptography with Error Correcting Capability,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, pp. 2465-2479, 2021. |