|
[CHAN08] C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [CIMA06] S. Cimato, R. De Prisco, and A. De Santis, “Probabilistic visual cryptography schemes,” The Computer Journal, vol. 49, pp. 97-107, 2006. [CIMA11] S. Cimato, and C.N. Yang, Visual cryptography and secret image sharing, CRC Press, Taylor & Francis, 2011. [ESLA11] Z. Eslami, S.H. Razzaghi, and J. Zarepour Ahmadabadi, “Secret image sharing with authentication-chaining and dynamic embedding,” Journal of Systems and Software, vol. 84, pp. 803-809, 2011. [FANG10] L.G. Fang, Y.M. Li, and B. Yu, “Multi-secret visual cryptography based on reversed images,” Information and Computer, vol. 4, pp. 195-198, 2010. [FENG08] J.B. Feng, H.C. Wu, C.S, Tsai, Y.F. Chang, and Y.P. Chu, “Visual secret sharing for multiple secrets,” Pattern Recognition, vol. 41, pp. 3572–3581, 2008. [GORE61] D. Gorenstein and N. Zierler, “A Class of Cyclic Linear Error-Correcting Codes in Symbols,” Journal of the Society for Industrial and Applied Mathematics, vol. 9, pp. 107-214, 1961. [ITO99] R. ITO, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryptography,” IEICE Trans. on Fund. of Elect. Comm. and Comp. Sci., vol. E82-A, pp. 2172-2177, 1999. [LEE11] K.H. Lee and P.L. Chiu, “A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images,” Optics Communications, vol. 284, pp. 2730-2741, 2011. [LI12] P. Li, P.J. Ma, X.H. Su, and C.N. Yang, “Improvements of a two-in-one image secret sharing scheme based on gray mixing model,” Journal of Visual Communication and Image Representation, vol. 23, pp. 441-453, 2012. [LIN04A] C.C. Lin, and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, pp. 405-414, 2004. [LIN04B] S. Lin, and D.J. Costello, Error control coding, Pearson Prentice Hall, 2004. [LIN07] S.J. Lin, and J.C. Lin, “VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,” Pattern Recognition, vol. 40, pp. 3652-3666, 2007. [LIN10] Y.Y. Lin, and R.Z. Wang, “Scalable secret image sharing with smaller shadow image,” IEEE Signal Processing Letters, vol. 17, pp. 316-319, 2010. [NOAR94] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology- EUROCRYPT’94, pp. 1-12, 1994. [REED60] I.S. Reed and G. Solomon, “Polynomial codes over certain finite fields,” Journal of the Society for Industrial and Applied Mathematics, vol. 8, pp. 300-304, 1960. [SHAM79] A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, pp. 612-613, 1979. [SHYU07] S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang, and K. Chen, “Sharing multiple secrets in visual cryptography,” Pattern Recognition, vol. 40, pp. 3633-3651, 2007. [THIE02] C.C. Thien, J.C. Lin, “Secret image sharing,” Computer & Graphics, vol. 26, pp. 765-770, 2002. [THIE03] C.C. Thien and J.C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp.1161-1169, 2003. [TSAI07] D.S. Tsai, T.H. Chen, and G. Horng, “A cheating prevention scheme for binary visual cryptography with homogeneous secret images,” Pattern Recognition, vol. 40, pp. 2356-2366, 2007. [VERH97] E.R. Verheul and H.C.A. Van Tilborg, “Constructions and properties of k out of n visual secret sharing scheme,” Designs, Codes and Cryptography, vol. 1, pp. 179–196, 1997. [WANG06] R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters , vol. 26, pp. 551-555, 2006. [WANG07] R.Z. Wang, and S.J. Shyu, “Scalable secret image sharing,” Signal Processing: Image Communication, vol. 22, pp. 363-373, 2007. [WANG11] D. Wang, F. Yi, and X. Li, “Probabilistic visual secret sharing schemes for grey-scale images and color images,” Information Sciences, vol. 181, pp. 2189-2208, 2011. [WU05] H.C. Wu and C.C. Chang, “Sharing visual multi-secrets using circle shares,” Computer Standards & Interfaces, vol. 28, pp. 123-135, 2005. [WU11] C.C. Wu, S.J. Kao, and M.S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,” Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011. [YANG04] C.N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, vol. 25, pp. 481-494, 2004. [YANG07] C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and software, vol. 80, pp. 1070-1076, 2007. [YANG08A] C.N. Yang, C.C. Wang, and T.S. Chen, “Visual cryptography schemes with reversing,” The Computer Journal, vol. 51, pp. 710-722, 2008. [YANG08B] C.N. Yang and T.S. Chen, “Colored visual cryptography scheme based on additive color mixing,” Pattern Recognition, vol. 41, pp. 3114–3129, 2008. [YANG09] C.N. Yang and C.B. Ciou, “A comment on sharing secrets in stego images with authentication,” Pattern Recognition, vol. 42, pp. 615-1619, 2009. [YANG10A] C.N. Yang and C.B. Ciou, “Image secret sharing method with two-decoding-options: lossless recovery and previewing capability,” Image and Vision Computing, vol. 28, pp. 1600-1610, 2010. [YANG10B] C.N. Yang, and S.M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Optics Communications, vol. 283, pp. 1750-1762, 2010. [YANG11] C.N. Yang, and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of System and Software, vol. 84, pp. 1726-1733, 2011. [YANG12] C.N. Yang, J.F. Ouyang, and L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, vol. 285, pp. 1725-1735, 2012. [YANG13] P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential secret image sharing scheme with different importance of shadows,” Journal of Visual Communication and Image Representation, vol. 24, pp. 1106-1114, 2013 . [YANG14] C.N. Yang, W.J Chang, S.R. Cai and C.Y. Lin, “Secret image sharing without keeping permutation key,” International Conference on Information and Communications Technologies, pp. 513-519, 2014.
|