An adaptive secret image sharing with a new bitwise steganographic property
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Secret Image Sharing Using Quadratic Residues , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[2] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[3] Der-Chyuan Lou,et al. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..
[4] Sorin Iftene,et al. Secret Sharing Schemes with Applications in Security Protocols , 2006, Sci. Ann. Cuza Univ..
[5] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[6] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[7] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[8] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[9] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[10] Chien-Chang Chen,et al. A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..
[11] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[12] Patrick P. K. Chan,et al. Steganalysis classifier training via minimizing sensitivity for different imaging sources , 2014, Inf. Sci..
[13] Ziba Eslami,et al. An authenticated image encryption scheme based on chaotic maps and memory cellular automata , 2013 .
[14] Anand Singh Jalal,et al. Secret image sharing using grayscale payload decomposition and irreversible image steganography , 2013, J. Inf. Secur. Appl..
[15] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[16] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[17] Shao Jinyou,et al. モアレ干渉縞パターンを用いたインプリントリソグラフィのアライメントの測定法 | 文献情報 | J-GLOBAL 科学技術総合リンクセンター , 2008 .
[18] Ching-Nung Yang,et al. Reducing shadow size in smooth scalable secret image sharing , 2014, Secur. Commun. Networks.
[19] Ziba Eslami,et al. Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..
[20] Xiaotian Wu,et al. Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform , 2013, J. Syst. Softw..
[21] N. Margolus,et al. Invertible cellular automata: a review , 1991 .
[22] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[23] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[24] Shyong Jian Shyu,et al. Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[25] Chih-Hung Lin,et al. Distortionless visual multi-secret sharing based on random grid , 2014, Inf. Sci..
[26] Ramón Alonso-Sanz,et al. Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .
[27] Ángel Martín del Rey,et al. A secret sharing scheme based on cellular automata , 2005, Appl. Math. Comput..
[28] Chien-Chang Chen,et al. A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..
[29] Reza Safabakhsh,et al. A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..
[30] Kent D. Boklan,et al. Introduction to cryptography with coding theory, second edition , 2007 .
[31] Amos Beimel,et al. Universally ideal secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[32] Sorin Iftene,et al. General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting , 2007, ICS@SYNASC.
[33] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[34] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[35] Steven X. Ding,et al. A Review on Basic Data-Driven Approaches for Industrial Process Monitoring , 2014, IEEE Transactions on Industrial Electronics.
[36] Gang Xu,et al. Quantum state secure transmission in network communications , 2014, Inf. Sci..
[37] Massoud Hadian Dehkordi,et al. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..
[38] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[39] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[40] M.R. Aref,et al. A novel secret sharing scheme from audio perspective , 2008, 2008 International Symposium on Telecommunications.
[41] Xiaodong Gu,et al. Histogram similarity measure using variable bin size distance , 2010, Comput. Vis. Image Underst..
[42] Ferucio Laurentiu Tiplea,et al. Distributive weighted threshold secret sharing schemes , 2016, Inf. Sci..
[43] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[44] Ziba Eslami,et al. A verifiable multi-secret sharing scheme based on cellular automata , 2010, Inf. Sci..
[45] Huijun Gao,et al. Data-Based Techniques Focused on Modern Industry: An Overview , 2015, IEEE Transactions on Industrial Electronics.
[46] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[47] Hao-Kuan Tso. Sharing secret images using Blakley's concept , 2008 .
[48] K. Srinathan,et al. A novel video encryption technique based on secret sharing , 2008, 2008 15th IEEE International Conference on Image Processing.
[49] Jun Shao,et al. Efficient verifiable multi-secret sharing scheme based on hash function , 2014, Inf. Sci..
[50] Adi Shamir,et al. How to share a secret , 1979, CACM.
[51] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[52] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.