Reversible Image Secret Sharing
暂无分享,去创建一个
Yuliang Lu | Xuehu Yan | Lintao Liu | Xianhua Song | Xuehu Yan | Xianhua Song | Yuliang Lu | Lintao Liu
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Xin Liu,et al. An enhanced threshold visual secret sharing based on random grids , 2015, Journal of Real-Time Image Processing.
[3] Chin-Chen Chang,et al. Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation , 2014, Signal Process..
[4] Jeng-Shyang Pan,et al. Multiple Watermarking in Visual Cryptography , 2008, IWDW.
[5] Chin-Chen Chang,et al. Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..
[6] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[7] V. Ralph Algazi,et al. Objective picture quality scale (PQS) for image coding , 1998, IEEE Trans. Commun..
[8] Bin Yu,et al. Improved Visual Secret Sharing Scheme for QR Code Applications , 2018, IEEE Transactions on Information Forensics and Security.
[9] Shyong Jian Shyu,et al. Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[10] Lei Zhu,et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..
[11] Song Wan,et al. Exploiting the Homomorphic Property of Visual Cryptography , 2017, Int. J. Digit. Crime Forensics.
[12] Ching-Nung Yang,et al. Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , 2015, Digit. Signal Process..
[13] Song Wan,et al. Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold , 2017, ICCCS.
[14] Moni Naor,et al. Secret-Sharing for NP , 2014, Journal of Cryptology.
[15] Song Wan,et al. Security Analysis of Secret Image Sharing , 2017, ICPCSEE.
[16] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[17] Neil Genzlinger. A. and Q , 2006 .
[18] Feng Liu,et al. Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..
[19] Bin Yu,et al. Visual Cryptography and Random Grids Schemes , 2013, IWDW.
[20] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[21] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[22] WeiQi Yan,et al. A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..
[23] Masayuki Fukumitsu,et al. A Proposal of a Secure P2P-Type Storage Scheme by Using the Secret Sharing and the Blockchain , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[24] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[25] Yuliang Lu,et al. Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).
[26] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[27] Feng Liu,et al. Basic Visual Cryptography Using Braille , 2016, Int. J. Digit. Crime Forensics.
[28] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[29] Linlin Guo,et al. Robust Image Fingerprinting via Distortion-Resistant Sparse Coding , 2018, IEEE Signal Processing Letters.
[30] Mohammad Atique,et al. Signature based authentication using contrast enhanced hierarchical visual cryptography , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[31] Shlomo Shamai,et al. An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.
[32] Vasif V. Nabiyev,et al. Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..
[33] Vasif V. Nabiyev,et al. A new secret image sharing technique based on Asmuth Bloom's scheme , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[34] Ting-Wei Chuang,et al. Image Sharing and Recovering Based on Chinese Remainder Theorem , 2016, 2016 International Symposium on Computer, Consumer and Control (IS3C).
[35] Xiaofeng Liao,et al. Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..
[36] Wen Wang,et al. Temporal Integration Based Visual Cryptography Scheme and Its Application , 2017, IWDW.
[37] Pei-Yu Lin,et al. Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..
[38] Atif Alamri,et al. Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.
[39] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[40] W. Marsden. I and J , 2012 .
[41] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[42] Nenghai Yu,et al. Emerging applications of reversible data hiding , 2018, ICIGP.