(N, 1) secret sharing approach based on steganography with gray digital images
暂无分享,去创建一个
[1] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[2] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[3] Amaury Lendasse,et al. Reliable Steganalysis Using a Minimum Set of Samples and Features , 2009, EURASIP J. Inf. Secur..
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[6] 홍유식,et al. Secret Sharing Scheme using Gray Code based on Steganography , 2009 .
[7] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[8] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[9] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[10] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[11] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[12] Chin-Chen Chang,et al. Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..
[13] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[14] Chin-Chen Chang,et al. A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images , 2008, 2008 International Symposium on Electronic Commerce and Security.
[15] Jen-Bang Feng,et al. A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..