Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach
暂无分享,去创建一个
[1] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[2]
Ching-Nung Yang,et al.
[3] Ching-Nung Yang,et al. $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..
[4] Xiaobo Li,et al. Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..
[5] Ching-Nung Yang,et al. A general multi-secret visual cryptography scheme , 2010 .
[6] Ran-Zan Wang,et al. Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.
[7] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[8] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[9] Ziba Eslami,et al. Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..
[10] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[11] Shang-Juh Kao,et al. Enhance the Image Sharing with Steganography and Authentication , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] Amos Beimel,et al. Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.
[13] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[14] Ching-Nung Yang,et al. A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..
[15] Ching-Nung Yang,et al. Constructions and properties of k out of n scalable secret image sharing , 2010 .
[16] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..
[17] Aversa,et al. General k , 1994, Physical review. B, Condensed matter.
[18] Ching-Nung Yang,et al. Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..
[19] Chih-Fong Tsai,et al. Block-based progressive visual secret sharing , 2013, Inf. Sci..
[20] Shyong Jian Shyu,et al. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.
[21] Chin-Chen Chang,et al. A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] Feng Liu,et al. Some Extensions on Threshold Visual Cryptography Schemes , 2010, Comput. J..
[24] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[25] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..