Applying cheating identifiable secret sharing scheme in multimedia security
暂无分享,去创建一个
Xiaohong Huang | Yan Ma | Zheng Ma | Manjun Zhang | Yanxiao Liu | Yan Ma | Xiaohong Huang | Zheng Ma | Manjun Zhang | Yanxiao Liu
[1] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[2] Yi-Cheng Chen,et al. (k, N) Scalable Secret Image Sharing with Multiple Decoding Options , 2020, J. Intell. Fuzzy Syst..
[3] YangChing-Nung,et al. $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012 .
[4] Satoshi Obana,et al. Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.
[5] Chin-Chen Chang,et al. Cheating resistance and reversibility-oriented secret sharing mechanism , 2011, IET Inf. Secur..
[6] Ching-Nung Yang,et al. Region-in-Region Incrementing Visual Cryptography Scheme , 2012, IWDW.
[7] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[8] Ching-Nung Yang,et al. (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..
[9] Ching-Nung Yang,et al. Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.
[10] Mark G. Karpovsky,et al. Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing , 2016, IEEE Transactions on Computers.
[11] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[12] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[13] Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.
[14] Ran-Zan Wang,et al. Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.
[15] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[16] Ching-Nung Yang,et al. Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management , 2021, IEEE Transactions on Intelligent Transportation Systems.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Lein Harn,et al. Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..
[19] Ching-Nung Yang,et al. $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..
[20] Satoshi Obana. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.
[21] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..