Threshold Secret Image Sharing
暂无分享,去创建一个
Wen Wang | Ching-Nung Yang | Feng Liu | Teng Guo | YaWei Ren | Chuan Kun Wu | Ching-Nung Yang | Chuankun Wu | Wen Wang | Teng Guo | Feng Liu | Y. Ren
[1] Feng Liu,et al. On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.
[2] Feng Liu,et al. K out of K Extended Visual Cryptography Scheme by Random Grids , 2014, Signal Process..
[3] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[4] Chyuan-Huei Thomas Yang,et al. Reversible secret image sharing based on Shamir's scheme with discrete haar wavelet transform , 2011, 2011 International Conference on Electrical and Control Engineering.
[5] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[6] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[7] Ran-Zan Wang,et al. Scalable user-friendly image sharing , 2010, J. Vis. Commun. Image Represent..
[8] Chaur-Heh Hsieh,et al. Progressive sharing for a secret image , 2010, J. Syst. Softw..
[9] Jen-Bang Feng,et al. A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..
[10] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[11] Ching-Nung Yang,et al. A comment on "Sharing secrets in stegoimages with authentication" , 2009, Pattern Recognit..
[12] Oded Goldreich. Randomized Methods in Computation-Lecture Notes , 2001 .
[13] Feng Liu,et al. Multi-pixel Encryption Visual Cryptography , 2011, Inscrypt.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[16] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[17] Feng Liu,et al. Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..
[18] Mihir Bellare,et al. Lecture Notes on Cryptography , 2001 .
[19] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[20] Peng Li,et al. Improvements of a two-in-one image secret sharing scheme based on gray mixing model , 2012, J. Vis. Commun. Image Represent..
[21] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[22] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[23] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[24] Li Bai. A Reliable (k, n) Image Secret Sharing Scheme , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[25] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[26] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[27] Rong Zhao,et al. A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.
[28] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[29] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[30] Feng Liu,et al. Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..
[31] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[32] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[33] A. Ben Hamza,et al. Robust Approaches to 3D Object Secret Sharing , 2010, ICIAR.
[34] Chi-Shiang Chan,et al. Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.
[35] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..