Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.
[2] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[3] Vasif V. Nabiyev,et al. Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..
[4] Tzung-Her Chen,et al. Multi-image encryption by circular random grids , 2012, Inf. Sci..
[5] Chin-Chen Chang,et al. A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..
[6] Chin-Chen Chang,et al. Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..
[7] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[8] Chin-Chen Chang,et al. A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[9] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[10] Chin-Chen Chang,et al. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels , 2006, Pattern Recognit..
[11] Ziba Eslami,et al. Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..
[12] Chin-Chen Chang,et al. A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction , 2011, J. Multim..
[13] Liqin Wang,et al. Color Image Sharing Method Based on Lagrange's Interpolating Polynomial , 2012, HIS.
[14] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[15] Chien-Chang Chen,et al. Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.
[16] Li Li,et al. A Lossless Secret Image Sharing Scheme Based on Steganography , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[17] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[18] Awadhesh Srivastava,et al. A secret sharing scheme for secure transmission of color images , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[19] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[20] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[21] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[22] Ja-Chen Lin,et al. Fast-weighted secret image sharing , 2009 .
[23] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[24] Feng Liu,et al. Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..
[25] Chin-Chen Chang,et al. An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[26] Chin-Chen Chang,et al. A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..
[27] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Bertram Felgenhauer,et al. Mathematics of Sudoku I , 2006 .
[30] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[31] Ziba Eslami,et al. Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..
[32] Tung-Shou Chen,et al. New visual cryptography system based on circular shadow image and fixed angle segmentation , 2005, J. Electronic Imaging.
[33] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[34] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[35] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[36] Pei-Yu Lin,et al. Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..
[37] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[38] Shyong Jian Shyu,et al. Weighted Threshold Secret Image Sharing , 2009, PSIVT.
[39] Ching-Nung Yang,et al. Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..
[40] Chin-Chen Chang,et al. A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper) , 2009, J. Commun..
[41] S. Kannan,et al. Secured secret color image sharing with steganography , 2012, 2012 International Conference on Recent Trends in Information Technology.