A construction method of (t, k, n)-essential secret image sharing scheme
暂无分享,去创建一个
[1] Chien-Chang Chen,et al. Two-layered structure for optimally essential secret image sharing scheme , 2016, J. Vis. Commun. Image Represent..
[2] Ziba Eslami,et al. Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..
[3] Shang-Kuan Chen,et al. Essential secret image sharing with increasable shadows , 2016 .
[4] Ching-Nung Yang,et al. Constructions and properties of k out of n scalable secret image sharing , 2010 .
[5] Ja-Chen Lin,et al. Fast-weighted secret image sharing , 2009 .
[6] Chin-Chen Chang,et al. A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..
[7] Shyong Jian Shyu,et al. Weighted Threshold Secret Image Sharing , 2009, PSIVT.
[8] Chien-Chang Chen,et al. Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.
[9] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[10] Stelvio Cimato,et al. Visual Cryptography and Secret Image Sharing , 2017 .
[11] Ching-Nung Yang,et al. A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..
[12] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[13] Chien-Chang Chen,et al. An Expandable Essential Secret Image Sharing Structure , 2016, J. Inf. Hiding Multim. Signal Process..
[14] Chien-Chang Chen,et al. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images , 2013, J. Electronic Imaging.
[15] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[16] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[17] Ching-Nung Yang,et al. Sharing more information in gray visual cryptography scheme , 2013, J. Vis. Commun. Image Represent..
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Chien-Chang Chen,et al. A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..
[20] Chin-Chen Chang,et al. A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..
[21] Ching-Nung Yang,et al. Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..
[22] Mingchu Li,et al. A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem , 2015, Multimedia Tools and Applications.
[23] Peng Li,et al. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography , 2016, Journal of Real-Time Image Processing.
[24] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[25] Mingchu Li,et al. (t, n) Threshold secret image sharing scheme with adversary structure , 2016, Multimedia Tools and Applications.
[26] Ja-Chen Lin,et al. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..
[27] Ching-Nung Yang,et al. Reducing shadow size in smooth scalable secret image sharing , 2014, Secur. Commun. Networks.
[28] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[29] Peng Li,et al. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach , 2015, Signal Process. Image Commun..
[30] Peng Li,et al. Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..