An Image Secret Sharing Technique with Block Based Image Coding
暂无分享,去创建一个
[1] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[2] Wei Sun,et al. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata , 2012, J. Syst. Softw..
[3] Vasif V. Nabiyev,et al. Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..
[4] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[5] Long-Wen Chang,et al. Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform , 2006, PSIVT.
[6] Shyong Jian Shyu,et al. Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..
[7] Xingang You,et al. A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[8] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[9] Linfei Chen,et al. Image encryption based on singular value decomposition and Arnold transform in fractional domain , 2013 .
[10] Wu-Lin Chen,et al. Efficient VQ-based image coding scheme using inverse function and lossless index coding , 2013, Signal Process..
[11] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[12] Bhabatosh Chanda,et al. Color image compression based on block truncation coding using pattern fitting principle , 2007, Pattern Recognit..
[13] Ran-Zan Wang,et al. Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.
[14] Bhabatosh Chanda,et al. A fast progressive image transmission scheme using block truncation coding by pattern fitting , 2012, J. Vis. Commun. Image Represent..
[15] Bhabatosh Chanda,et al. Block truncation coding using pattern fitting , 2004, Pattern Recognit..
[16] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[19] Ja-Chen Lin,et al. Secret Image Sharing based on Vector Quantization , 2009 .
[20] Chin-Chen Chang,et al. Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..
[21] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[22] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[23] Chin-Chen Chang,et al. New method of secret image sharing based upon vector quantization , 2001, J. Electronic Imaging.
[24] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[25] H. H. Zayed,et al. An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.
[26] Juan M. Vilardy,et al. Double image encryption method using the Arnold transform in the fractional Hartley domain , 2013, Iberoamerican Meeting of Optics and the Latin American Meeting of Optics, Lasers and Their Applications.
[27] Chih-Fong Tsai,et al. Block-based progressive visual secret sharing , 2013, Inf. Sci..
[28] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[29] Yu-Chen Hu,et al. Fast VQ codebook search algorithm for grayscale image coding , 2008, Image Vis. Comput..
[30] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[31] Ying-Yu Chen,et al. Quality-adaptive visual secret sharing by random grids , 2013, J. Syst. Softw..
[32] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[33] Wei Sun,et al. Visual secret sharing for general access structures by random grids , 2012, IET Inf. Secur..
[34] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.