Secret Image Sharing Revisited: Forbidden Type, Support Type, and Their Two Approaches

[1]  Chia-Chen Chang,et al.  H.264 video watermarking with secret image sharing , 2009, 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting.

[2]  Rahul Dutta,et al.  Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing , 2014, Netw. Protoc. Algorithms.

[3]  Shang-Kuan Chen,et al.  Essential secret image sharing with increasable shadows , 2016 .

[4]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[5]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[6]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[7]  Ja-Chen Lin,et al.  Progressive sharing of multiple images with sensitivity-controlled decoding , 2015, EURASIP J. Adv. Signal Process..

[8]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[9]  K. Jung,et al.  Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion , 2014 .

[10]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[11]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Ja-Chen Lin,et al.  Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..

[14]  Ali Kanso,et al.  An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.

[15]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[16]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..