Progressive sharing of multiple images with sensitivity-controlled decoding
暂无分享,去创建一个
[1] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[2] Ja-Chen Lin,et al. Protection of PDF Files: a Sharing Approach , 2014 .
[3] G. Athisha,et al. IMPROVING THE PROTECTION OF FPGA BASED SEQUENTIAL IP CORE DESIGNS USING HIERARCHICAL WATERMARKING TECHNIQUE , 2014 .
[4] Feng Yi,et al. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme , 2010, EURASIP J. Adv. Signal Process..
[5] Du-Shiau Tsai,et al. Reversible data hiding scheme based on neighboring pixel differences , 2013, Digit. Signal Process..
[6] Ja-Chen Lin,et al. Reversible JPEG-Based Hiding Method with High Hiding-Ratio , 2010, Int. J. Pattern Recognit. Artif. Intell..
[7] Chang-Chou Lin,et al. Secret image sharing with capability of share data reduction , 2003 .
[8] Ja-Chen Lin,et al. Progressive sharing of an image , 2008 .
[9] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[10] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[11] Kuang-Shyr Wu. A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..
[12] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[13] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[14] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[15] E. Castillo,et al. Automated Signature Insertion in Combinational Logic Patterns for HDL IP Core Protection , 2008, 2008 4th Southern Conference on Programmable Logic.
[16] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[17] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[18] Shilpy Dilip Mukherjee,et al. Review on algorithns and techniques of reversible data hiding , 2014 .
[19] T. Chen,et al. Symmetric Threshold Multipath (STM): An online symmetric key management scheme , 2014, Inf. Sci..
[20] Ja-Chen Lin,et al. Multithreshold progressive image sharing with compact shadows , 2010, J. Electronic Imaging.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Ja-Chen Lin,et al. Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..
[23] Dimitrios Hatzinakos,et al. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..
[24] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[25] M. Weeks,et al. Watermarking with wavelets: Simplicity leads to robustness , 2008, IEEE SoutheastCon 2008.
[26] Irena Orovic,et al. An image watermarking based on the pdf modeling and quantization effects in the wavelet domain , 2012, Multimedia Tools and Applications.