Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching
暂无分享,去创建一个
[1] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[2] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[3] Chin-Chen Chang,et al. Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism , 2013, Image Vis. Comput..
[4] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[5] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[6] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[7] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[8] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[9] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[10] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[11] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[14] Chin-Chen Chang,et al. Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..
[15] Tong Liu,et al. Improving the visual quality of random grid-based visual secret sharing via error diffusion , 2013, J. Vis. Commun. Image Represent..
[16] Vasif V. Nabiyev,et al. Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..
[17] Wei-Kuei Chen,et al. Image sharing method for gray-level images , 2013, J. Syst. Softw..
[18] Ziba Eslami,et al. Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..
[19] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[20] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[21] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[22] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.