|
[AHMA19] A.M. Ahmadian and M. Amirmazlaghani, “A Novel Secret Image Sharing with Steganography Scheme Utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms,” Signal Processing: Image Communication, vol. 74, pp. 78-88, 2019. [BENA87] J.C. Benaloh. “Secret Sharing Homomorphisms: Keeping Shares of A Secret” Proceedings of Crypto’86, vol. 263, pp. 251-260, 1987. [CHAN08] C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing Secrets in Stego Images with Authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [CHEN16] C.C. Chen and S.C. Chen, “Two-layered Structure for Optimally Essential Secret Image Sharing Scheme,” Journal of Visual Communication and Image Representation, vol. 38, pp. 595-601, 2016. [DING18] W. Ding, K. Liu, X. Yan, H. Wang, L. Liu, and Q. Gong, “An Image Secret Sharing Method Based on Matrix Theory,” Symmetry, vol. 10, 530, 2018. [KANS17] A. Kanso and M. Ghebleh , “An Efficient (t, n)-Threshold Secret Image Sharing Scheme,” Multimedia Tools and Applications, vol. 76, pp. 16369-16388, 2017. [LI13] P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential Secret Image Sharing Scheme with Different Importance of Shadows,” Journal of Visual Communication and Image Representation, vol. 24, pp. 1106-1114, 2013. [LI14] P Li, Q Kong, and Y Ma, “Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, pp. 353-366, 2014. [LIN07] S.J. Lin and J.C. Lin , “VCPSS: A Two-in-one Two-decoding-options Image Sharing Method Combining Visual Cryptography (VC) and Polynomialstyle Sharing (PSS) Approaches,” Pattern Recognition, vol. 40, pp. 3652-3666, 2007. [LIN09] C.C. Lin and W.H. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems and Software, vol. 73, pp. 405-414,2004. [LIN10] Y.Y. Lin and R.Z. Wang, “Scalable Secret Image Sharing with Smaller Shadow Images” IEEE Signal Processing Letters, vol. 17, pp. 316-319,2010. [LIU17] Y. Liu, C.N. Yang, “Scalable Secret Image Sharing Scheme with Essential Shadows,” Signal Processing, vol. 58, pp. 49-55, 2017. [LIU18] Y.X. Liu, Q.D. Sun, and C.N. Yang, “(k, n) Secret Image Sharing Scheme Capable of Cheating Detection,” EURASIP Journal on Wireless Communications and Networking, Article number: 72, 2018. [LIU21] Y.X. Liu, C.N. Yang, and Q. Sun, “Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management,”IEEE Transactions on Intelligent Transportation Systems, vol. 22, pp. 3952-3960, July 2021. [MORE06] R.H. Morelos-Zaragoza, The Art of Error Correction Coding (Chapter 4), John Willey & Sons Ltd., 2006. [SRIV16] S. Srividhya, R. Sathishkumar, and G.F. Sudha,“Implementation of TiOISSS with meaningful Shadows and with an Additional Authentication Image,” Journal of Visual Communication and Image Representation, vol.38, pp. 284-296, 2016. [THIE02] C.C. Thien and J.C. Lin, “Secret Image Sharing,” Computers & Graphics, vol. 26, no. 5, pp. 765-770, 2002. [ULUT13] G. Ulutas, M. Ulutas, and V.V. Nabiyev, “Secret Image Sharing Scheme with Adaptive Authentication Strength,” Pattern Recognition Letters, vol.34, pp. 283-291, 2013. [WU19a] X. Wu and C.N. Yang, “Partial Reversible AMBTC-based Secret Image Sharing with Steganography,” Digit Signal Processing, vol. 93, pp.22-33,2019. [WU19b] X. Wu and C.N. Yang, "Invertible Secret Image Sharing with Steganography and Authentication for AMBTC Compressed Images,” Signal Processing: Image Communication, vol. 78, pp. 437-447, 2019. [WU20] X. Wu, C.N. Yang, and Y.Y. Yang, “Sharing and Hiding a Secret Image in Color Palette Images with Authentication,” Multimedia Tools and Applications, vol. 79, pp. 25657-25677, 2020. [XION20] L. Xiong. X. Zhong, and C.N. Yang, “DWT-SISA: A Secure and Effective Discrete Wavelet Transform-based Secret Image Sharing with Authentication,” Signal Processing, vol. 173, Article 107571, 2020. [XION21] L. Xiong et al., “RSIS: A Secure and Reliable Secret Image Sharing System based on Extended Hamming Codes in Industrial Internet of Things,” IEEE Internet of Things Journal (doi: 10.1109/JIOT.2021. 3139657), 2021. [YAN21] X. Yan, C.N. Yang, X. Zhang, and S. Wang, “A Common Method of Share Authentication in Image Secret Sharing,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, pp. 2896-2908, 2021. [YANG07] C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems and Software, vol. 80, pp. 1070-1076, 2007. [YANG09] C.N. Yang, C.B. Ciou, “A Comment on Sharing Secrets in Stego Images with Authentication,” Pattern Recognition, vol. 42, pp. 1615-1619, 2009. [YANG10a] C.N. Yang and S.M. Huang, “Constructions and Properties of k out of n Scalable Secret Image Sharing,” Optics Communication, vol. 283, pp. 1750-1762, 2010. [YANG10b] C.N. Yang and C.B. Ciou, “Image Secret Sharing Method with Twodecoding-options: Lossless Recovery and Previewing Capability,” Image and Vision Computing, vol. 28, pp. 1600-1610, 2010. [YANG11] C.N. Yang and Y.Y. Chu, “A General (k, n) Scalable Secret Image Sharing Scheme with the Smooth Scalability,” Journal of Systems and Software, vol.84, pp. 1726-1733, 2011. [YANG12] C.N. Yang, J.F. Ouyang, and L. Harn, “Steganography and Authentication in Image Sharing without Parity Bits,” Optics Communication, vol. 285, pp.1725-1735, 2012. [YANG14] C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, “Secret Image Sharing without Keeping Permutation Key,” ICT (International Conference on Information and Communications Technologies), doi: 10.1049/cp.2014.0625, pp. 410-416, 2014. [YANG15] C.N. Yang, P. Li P, C.C. Wu, and S.R. Cai, “Reducing Shadow Size in Essential Secret Image Sharing by Conjunctive Hierarchical Approach,”Signal Processing, vol. 31, pp. 1-9, 2015. [ZHAO09] R. Zhao, J. Zhao, F. Dai, and F. Zhao, “A New Image Secret Sharing Scheme to Identify Cheaters,” Computer Standards & Interfaces, vol. 31, pp. 252-257, 2009. [ZHOU18] Z. Zhou, C.N. Yang, Y. Cao, and X. Sun, “Secret Image Sharing based on Encrypted Pixels,” IEEE Access, vol. 6, pp. 15021-15025, 2018. |