Secret Image Sharing Revisited: Forbidden Type, Support Type, and Their Two Approaches
暂无分享,去创建一个
[1] Chia-Chen Chang,et al. H.264 video watermarking with secret image sharing , 2009, 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting.
[2] Rahul Dutta,et al. Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing , 2014, Netw. Protoc. Algorithms.
[3] Shang-Kuan Chen,et al. Essential secret image sharing with increasable shadows , 2016 .
[4] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[5] Vasif V. Nabiyev,et al. Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..
[6] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[7] Ja-Chen Lin,et al. Progressive sharing of multiple images with sensitivity-controlled decoding , 2015, EURASIP J. Adv. Signal Process..
[8] A. Ben Hamza,et al. Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..
[9] K. Jung,et al. Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion , 2014 .
[10] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[11] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Ja-Chen Lin,et al. Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..
[14] Ali Kanso,et al. An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.
[15] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[16] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..