On the Feasibility and Security of Image Secret Sharing Scheme to Identify Cheaters
暂无分享,去创建一个
Peng Li | Qian Kong | Yanpeng Ma | Q. Kong | Peng Li | Yanpeng Ma
[1] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[2] Chang-Chou Lin,et al. Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..
[3] Yôiti Suzuki,et al. Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme , 2010, J. Inf. Hiding Multim. Signal Process..
[4] Chin-Chen Chang,et al. Sharing a Secret Image in Binary Images with Verification , 2011, J. Inf. Hiding Multim. Signal Process..
[5] Underwood Dudley. Elementary Number Theory , 1978 .
[6] Chin-Chen Chang,et al. A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor , 2012, J. Inf. Hiding Multim. Signal Process..
[7] Ching-Nung Yang,et al. Colored visual cryptography scheme based on additive color mixing , 2008, Pattern Recognit..
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Jen-Bang Feng,et al. A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..
[10] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[11] Mei-Yi Wu,et al. An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..
[12] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[13] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[14] David Burton. Elementary Number Theory , 1976 .
[15] Zengqiang Chen,et al. Image encryption based on a new total shuffling algorithm , 2008 .
[16] Jen-Bang Feng,et al. Visual secret sharing for multiple secrets , 2008, Pattern Recognit..
[17] Rong Zhao,et al. A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.
[18] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[19] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[20] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..