Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography
暂无分享,去创建一个
[1] Yuliang Lu,et al. Lossless $(k,n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption , 2019, IEEE Access.
[2] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[3] Rastislav Lukac,et al. User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes , 2007, MMM.
[4] Ching-Nung Yang,et al. Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..
[5] Shaohua Tang,et al. A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.
[6] Xuehu Yan,et al. Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images , 2018, Symmetry.
[7] Yuliang Lu,et al. General Meaningful Shadow Construction in Secret Image Sharing , 2018, IEEE Access.
[8] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[9] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[10] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[11] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[12] Pei-Ling Chiu,et al. Efficient constructions for progressive visual cryptography with meaningful shares , 2019, Signal Process..
[13] Li Liu,et al. Secret sharing: using meaningful image shadows based on Gray code , 2016, Multimedia Tools and Applications.
[14] K. Egiazarian,et al. Noise Measurement for Raw-Data of Digital Imaging Sensors by Automatic Segmentation of Nonuniform Targets , 2007, IEEE Sensors Journal.
[15] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[16] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[17] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[18] Yuliang Lu,et al. Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.