Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations
暂无分享,去创建一个
[1] Gwoboa Horng,et al. A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography , 2012, J. Vis. Commun. Image Represent..
[2] Chien-Chang Chen,et al. A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..
[3] Himanshu S. Mazumdar,et al. Universal Share for Multisecret Image Sharing Scheme Based on Boolean Operation , 2016, IEEE Signal Processing Letters.
[4] Peng Li,et al. A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..
[5] Arun Kumar Sangaiah,et al. Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..
[6] Ziba Eslami,et al. A (t, n)-multi secret image sharing scheme based on Boolean operations , 2018, J. Vis. Commun. Image Represent..
[7] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[8] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[9] Tzungher Chen,et al. Efficient multi-secret image sharing based on Boolean operations , 2011, Signal Process..
[10] Chien-Chang Chen,et al. Highly efficient and secure multi-secret image sharing scheme , 2015, Multimedia Tools and Applications.
[11] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[12] Ching-Nung Yang,et al. Random grid-based visual secret sharing with multiple decryptions , 2015, J. Vis. Commun. Image Represent..
[13] Moni Naor,et al. Visual cryptography for grey level images , 2000, Inf. Process. Lett..
[14] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[15] Chih-Hung Lin,et al. Friendly progressive random-grid-based visual secret sharing with adaptive contrast , 2015, J. Vis. Commun. Image Represent..
[16] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[17] Chien-Chang Chen,et al. A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..
[18] Pradeep K. Atrey,et al. Secret sharing approach for securing cloud-based pre-classification volume ray-casting , 2015, Multimedia Tools and Applications.
[19] Ali Kanso,et al. A novel secret image sharing scheme using large primes , 2017, Multimedia Tools and Applications.
[20] Shaohua Tang,et al. A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.
[21] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[22] Zheng Qin,et al. Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..
[23] Ching-Nung Yang,et al. Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.
[25] Shu-jen H. Chang,et al. SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash , 2016 .
[26] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[27] Xiaobo Li,et al. Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..
[28] Ali Kanso,et al. An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.
[29] Neeta Nain,et al. A novel approach for sharing multiple color images by employing Chinese Remainder Theorem , 2017, J. Vis. Commun. Image Represent..
[30] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[31] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[32] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[33] Arambam Neelima,et al. A survey paper on secret image sharing schemes , 2018, International Journal of Multimedia Information Retrieval.
[34] Kamel Mohamed Faraoun,et al. Design of a new efficient and secure multi-secret images sharing scheme , 2017, Multimedia Tools and Applications.
[35] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..