A novel approach for sharing multiple color images by employing Chinese Remainder Theorem
暂无分享,去创建一个
[1] Jen-Bang Feng,et al. A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..
[2] Mingwu Zhang,et al. Realizing secret sharing with general access structure , 2016, Inf. Sci..
[3] Chin-Chen Chang,et al. Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation , 2014, Signal Process..
[4] Chien-Chang Chen,et al. A secure Boolean-based multi-secret image sharing scheme , 2014, J. Syst. Softw..
[5] Soni Choudhary,et al. Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS) , 2017 .
[6] Neeta Nain,et al. Enhanced Modulo Based Multi Secret Image Sharing Scheme , 2016, ICISS.
[7] Chien-Chang Chen,et al. A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..
[8] Neeta Nain,et al. A Novel Approach of an (n, n) Multi-Secret Image Sharing Scheme Using Additive Modulo , 2016, CVIP.
[9] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[10] V. P. Binu,et al. Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing , 2017, Wirel. Pers. Commun..
[11] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[12] Neeta Nain,et al. Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo , 2016, Multimedia Tools and Applications.
[13] Maroti Deshmukh,et al. A Technique to Share Multiple Secret Images , 2016, ArXiv.
[14] Engin Avci,et al. A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images , 2016, Displays.
[15] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[16] Neeta Nain,et al. An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[17] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[18] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[19] Yanjun Liu,et al. Distortion-free secret image sharing method with two meaningful shadows , 2016, IET Image Process..
[20] Chin-Chen Chang,et al. A multi-threshold secret image sharing scheme based on MSP , 2012, Pattern Recognit. Lett..
[21] Her-Chang Chao,et al. XOR-based progressive visual secret sharing using generalized random grids , 2017, Displays.
[22] Mingchu Li,et al. A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem , 2015, Multimedia Tools and Applications.
[23] V. Ch. Venkaiah,et al. Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem , 2015, ICARCSET '15.
[24] Suneeta Agarwal,et al. XOR based continuous-tone multi secret sharing for store-and-forward telemedicine , 2016, Multimedia Tools and Applications.
[25] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[26] Ching-Nung Yang,et al. Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..
[27] Tzungher Chen,et al. Efficient multi-secret image sharing based on Boolean operations , 2011, Signal Process..
[28] William Stallings,et al. Cryptography and network security , 1998 .
[29] Aggelos Kiayias,et al. Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[30] Giovanni Di Crescenzo,et al. Multi-Secret Sharing Schemes , 1994, CRYPTO.
[31] Mingchu Li,et al. (t, n) Threshold secret image sharing scheme with adversary structure , 2016, Multimedia Tools and Applications.
[32] Chakravarthy Bhagvati,et al. CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..
[33] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.