Secret image sharing with authentication-chaining and dynamic embedding
暂无分享,去创建一个
[1] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[2] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[3] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[4] Chin-Chen Chang,et al. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels , 2006, Pattern Recognit..
[5] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[6] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[9] Feng Liu,et al. Some Extensions on Threshold Visual Cryptography Schemes , 2010, Comput. J..
[10] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[11] Chang-Chou Lin,et al. Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..
[12] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[13] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[14] Ching-Nung Yang,et al. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality , 2007, Int. J. Pattern Recognit. Artif. Intell..
[15] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[16] Der-Chyuan Lou,et al. A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..
[17] Ching-Nung Yang,et al. Colored visual cryptography scheme based on additive color mixing , 2008, Pattern Recognit..
[18] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[19] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[20] Jen-Bang Feng,et al. Visual secret sharing for multiple secrets , 2008, Pattern Recognit..
[21] Gwoboa Horng,et al. A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..
[22] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[23] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[24] Ching-Nung Yang,et al. Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation , 2006, Pattern Recognition.
[25] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[26] Ching-Nung Yang,et al. A comment on "Sharing secrets in stegoimages with authentication" , 2009, Pattern Recognit..