A high quality image sharing with steganography and adaptive authentication scheme
暂无分享,去创建一个
[1] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[2] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[3] K-C Liaoa,et al. Security of fragile watermarking scheme for image authentication , 2006 .
[4] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .
[5] Chin-Chen Chang,et al. A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..
[6] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[7] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[8] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[9] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[10] Claudio Soriente,et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..
[11] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[12] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[13] Shang-Juh Kao,et al. Enhance the Image Sharing with Steganography and Authentication , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[14] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[15] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[16] F. Chung,et al. Fragile watermarking scheme for image authentication , 2003 .
[17] Zhenxing Qian,et al. Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.
[18] Iuon-Chang Lin,et al. Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[19] Ching-Nung Yang,et al. A comment on "Sharing secrets in stegoimages with authentication" , 2009, Pattern Recognit..
[20] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[21] Claudio Soriente,et al. Security and privacy issues in the Portable Document Format , 2010, J. Syst. Softw..
[22] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[23] Wei-Bin Lee,et al. A public verifiable copy protection technique for still images , 2002, J. Syst. Softw..
[24] Shang-Juh Kao,et al. A Robust-Fragile Watermarking Scheme for Image Authentication , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[25] Ziba Eslami,et al. Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..
[26] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[27] Wei-Pang Yang,et al. A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.
[28] Chin-Chen Chang,et al. A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..
[29] Chaur-Heh Hsieh,et al. Progressive sharing for a secret image , 2010, J. Syst. Softw..
[30] Adi Shamir,et al. How to share a secret , 1979, CACM.
[31] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[32] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[33] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[34] Chin-Feng Lee,et al. A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..