|
中文 [1] 傅文殷、陳建彰 2005 植基於多維空間的機密影像分享方法,玄奘大學資訊管理學系碩士論文。 [2] 楊吳泉 1997 現代密碼學入門與程式設計,台北:全華。 西文 [3] A. Shamir, “How to Share a Secret”, Communication of the ACM, Vol. 22, pp.612-613, 1979. [4] Chin-Chen Chang, Ren-Junn Hwang, “Sharing Secret Images Using Shadow Codebooks”, Information Sciences – Applications : An International Journal, Vol. 111, pp. 335-345, 1998. [5] Chang-Chou Lin, Wen-Hsiang Tsai, “Secret Image Sharing with Steganography and Authentication”, The Journal of Systems and Software, Volume: 73, Issue: 3, Nov.-Dec., pp. 405-414, 2004. [6] Chih-Ching Thien, Ja-Chen Lin, “Secret image sharing”, Computers & Graphics, Vol. 26, pp.765-770, 2002. [7] Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, “A (t,n) Multi-Secret Sharing Scheme” Applied Mathematics and Computation,Vol. 151, pp.483-490, 2004. [8] Chwer-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen, “Sharing Multiple Secrets in Digital Images” The Journal of Systems and Software, Vol. 64, pp.163-170, 2002. [9] G..R. Blakley, “Safeguarding cryptographic keys”, Proceedings AFIPS National Computer Conference, Vol. 48, pp. 313-317, 1979. [10] Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey, “A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata”, Springer-Verlag Berlin Heidelberg, Vol. 3522, pp.411-418, 2005 [11] J. He, E. Dawson, “Multistage secret sharing based on one-way function”, Electronics Letters, Vol. 30 No. 19, pp.1591-1592, 1994. [12] Karnin, E. Greene, J. Hellman, “On Secret Sharing Systems”, IEEE Transactions on Information Theory, Vol. 29, PP. 35-41, 1983 [13] K.Y. Chen, W.P. Wu, C.S. Laih, “On the (2,2) Visual Muti-Secret Sharing Schemes” Proceedings of the 2000 International Computer Symposium Workship on Cryptography and Information Security, pp.73-80, Dec. 2000. [14] L. Harn, “Comment on Multistage secret sharing based on one-way function”, Electronics Letters, Vol. 31 No. 4, pp.262, 1995. [15] Ting-Yi Chang t Min-Shiang Hwangt Wei-Pang Yangt, “A New Multi-Stage secret sharing based on one-way function”, ACM SIGOPS Operating Systems Review, Vol.39 Iss. 1, pp.48-55, Jan. 2005. [16] M. Noar, A. Shamir, “Visual Cryptogrphy”, Advances in Cryptology : Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12, 1995. [17] Wang Mingsheng, Wang Guilin, Feng Dengguo, “A Secret Sharing Scheme Based On Linear Transformation”, Institute of Software, Chinese Academy of Science (ISCAS), pp. 134-139, 2001 [18] Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin, “Sharing and Hiding Secret Images with Size Constraint”, The Journal of the Pattern Recognition Society, Vol. 37, pp.1377-1385, 2004.
|