An improved threshold multi-level image recovery scheme
暂无分享,去创建一个
[1] Peng Li,et al. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach , 2015, Signal Process. Image Commun..
[2] Xuehu Yan,et al. Threshold progressive visual cryptography construction with unexpanded shares , 2015, Multimedia Tools and Applications.
[3] Peng Li,et al. Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..
[4] Her-Chang Chao,et al. Random-grid based progressive visual secret sharing scheme with adaptive priority , 2017, Digit. Signal Process..
[5] Qian Kong,et al. Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation , 2014, J. Inf. Hiding Multim. Signal Process..
[6] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[7] Chin-Chen Chang,et al. A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..
[8] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[9] Chunming Tang,et al. Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..
[10] Ziba Eslami,et al. Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..
[11] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[12] Ching-Nung Yang,et al. Constructions and Properties of General ( k, n ) Block-Based Progressive Visual Cryptography , 2015 .
[13] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[14] Ziba Eslami,et al. Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..
[15] Chin-Chen Chang,et al. A novel image protection scheme using bit-plane compression and secret sharing , 2017 .
[16] Kuang-Shyr Wu. A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..
[17] Ching-Nung Yang,et al. Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..
[18] Tamir Tassa,et al. Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Xiaojing Wang,et al. A New Approach to Image Sharing with High-Security Threshold Structure , 2014, JACM.
[21] Shaohua Tang,et al. A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.
[22] Jung-San Lee,et al. Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.
[23] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[24] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[25] Chin-Chen Chang,et al. Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..
[26] Chin-Chen Chang,et al. A grouped-scalable secret image sharing scheme , 2014, Multimedia Tools and Applications.