|
[1] P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, Vol. 20, No. 7, pp. 767–769, 1995. [2] P.P. Dang and P.M. Chau, “Image encryption for secure Internet multimedia applications,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395–403, 2000. [3] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, Vol. 87, no. 7, pp. 1062–1078, Jul. 1999. [4] R.B. Wolfgang and E.J. Delp, “A watermark for digital images,” Proceedings of IEEE International Conference on Image Processing, Vol. 3, pp. 219–222, 1996. [5] A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612−613, 1979. [6] C.C. Thien and J.C. Lin, “Secret image sharing,” Computers and Graphics, Vol. 26, No. 5, pp. 765−770, 2002. [7] R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, Vol. 27, No. 6, pp. 551−555, 2006. [8] C. Asmuth and J. Bloom, “A modular approach to key safeguarding,” IEEE Transactions On Information Theory, Vol. IT-29, No. 2, pp, 208−210, 1983. [9] G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference Proceedings, Vol. 48, pp. 313−317, 1979. [10] A. Beimel and B. Chor, “Secret sharing with public reconstruction,” IEEE Transactions On Information Theory, Vol. 44, No. 5, pp. 1887−1896, 1998. [11] D. Wang, L. Zhang, N. Ma, and X. Li, “Two secret sharing schemes based on Boolean operations,” Pattern Recognition, Vol. 40, No. 10, pp. 2776–2785, 2007. [12] H. Wang and D.S. Wong, “On secret reconstruction in secret sharing scheme,” IEEE Transactions On Information Theory, Vol. 54, No. 1, pp. 6−13, 2008. [13] R.Z. Wang and S.J. Shyu, "Scalable secret image sharing," Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363−373, 2007. [14] C.C. Lin and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems & Software, Vol. 73, No. 3, pp. 405−414, 2004. [15] C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, Vol. 80, No. 7, pp. 1070−1076, 2007. [16] C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, Vol. 41, No. 10, pp. 3130−3137, 2008. [17] P.Y. Lin, J.S. Lee, and C.C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition, Vol. 42, No. 5, pp. 886−895, 2009. [18] P.Y. Lin and C.S. Chan, “Invertible secret image sharing with steganography,” Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887−1893, Oct. 2010. [19] D. Cotting, T. Weyrich, M. Pauly and M. Gross, “Robust Watermarking of Point-Sampled Geometry,” Proceedings International Conference on Shape Modeling and Applications, pp. 233-242, 2004. [20] B.L Yeo and M.M Yeung, “Watermarking 3D objects for verification,” IEEE Computer Graphics and Applications, Vol.19, pp. 36−45, 1999. [21] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models,” Proceedings of the ACM International Multimedia Conference & Exhibition, pp. 261−272, 1997. [22] O. Benedens, “Geometry-Based Watermarking of 3D Models,” IEEE Computer Graphics and Applications, Vol. 19, pp. 46−55, 1999. [23] H.Y. Lin, H.Y. Liao, C.S. Lu, and J.C. Lin, “Fragile watermarking for authenticating 3-D polygonal meshes,” IEEE Transactions on Multimedia, Vol. 7, pp. 997−1006, 2005. [24] C.M Chou and D.C Tseng, “A public fragile watermarking scheme for 3D model authentication,” CAD Computer Aided Design, Vol. 38, pp. 1154−1165, 2006. [25] R. Ohbuchi, A. Mukaiyama and S. Takahashi, “Watermarking a 3D shape model defined as a point set,” International Conference on Cyberworlds, pp. 392−399, 2004. [26] F. Cayre and B. Macq, “Data Hiding on 3-D Triangle Meshes,” IEEE Transactions on Signal Processing, Vol. 51, pp. 939−949, 2007. [27] M.W Chao, C.H Lin, C.W Yu, and T.Y Lee, “A high capacity 3D steganography algorithm,” IEEE Transactions On Visualization and Computer Graphics, Vol. 15, pp. 274−284, 2009. [28] C.M Wang and Y.M Cheng, “An efficient information hiding algorithm for polygon models,” Computer Graphics Forum, Vol. 24, No. 3, pp. 591−600, 2005. [29] Y.M Cheng and C.M Wang, “A high-capacity steganographic approach for 3D polygonal meshes,” The Visual Computer, Vol. 22, No. 9, pp. 845−855, 2006. [30] C.M Wang, Y.M Cheng, K.C Wu, C.W Tao, Y.T Tseng and Y.K Liao, “A Secret 3D Polygonal Model Sharing Algorithm with Steganography,” Journal of Engineering, National Chung Hsing University, Vol. 18, No. 1, pp. 41−53, 2007. [31] R.Z. Wang, Y.H. Chiou, “Sharing and Hiding Secret 3D Point-Sampled Model with Natural Stego-Models,” Conference on Computer Vision, Graphics, and Image Processing 2010. [32] Greg Turk. (1998). [Online]. Available: http://www.cc.gatech.edu/~turk/ [33] ANSI/IEEE Standard 754-1985, Standard for Binary Floating Point Arithmetic, New York:The Instiute of Electrical and Electronics Engineers, 1985. [34] R.Z. Wang, Y.Y. Lin, “Region Incrementing Multisecret Image Sharing,” Thesis of Computer Science and Engineering, Yuan-Ze University, 2009.
|