|
[CHAN08] C.C. Chang, Y.P. Hsieh, and C.H. Lin,“Sharing secrets in stego images with authentication,”Pattern Recognition, Vol. 41, pp. 3130-3137, 2008. [CHEN14] C.C. Chen and W.J. Wu,“A secure Boolean-based multi-secret image sharing scheme, ”Journal of Systems and Software, Vol. 92, pp. 107-114, 2014. [CHEN17] Y. Chen,“Fully incrementing visual Cryptography from a succinct non-monotonic structure,”IEEE Transactions on Information Forensics and Security, Vol. 12, pp. 1082-1091, 2017. [JIA18] X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative visual cryptog-raphy schemes,”IEEE Transactions on Circuits and Systems for Video Technology, Vol. 28, pp. 1056-1070, 2018. [LIN10] Y.Y. Lin and R.Z. Wang,“Scalable secret image sharing with smaller shadow images,”IEEE Signal Processing Letters, Vol. 17, pp. 316-319, 2010. [LIU17] Y.X. Liu and C.N. Yang,“Scalable secret image sharing scheme with es-sential shadows,”Signal Processing: Image Communication, Vol. 58, pp. 49-55, 2017. [LI18] P. Li, Z. Liu, and C.N. Yang,“A construction method of (t, k, n)-essential secret image sharing scheme,”Signal Processing: Image Communication, Vol. 65, pp. 210-220, 2018 [LIU18] X. Liu, C.N. Yang, S.Y. Wu, and Y.S. Chou,“Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes,” Signal Processing: Image Communication, Vol. 66, pp. 77-86, 2018. [NAOR95] M. Naor and A. Shamir,“Visual cryptography,”Advances in Cryptolo-gy-EUROCRYPT’ 94, LNCS 950, pp.1-12, 1995. [SHAM79] A. Shamir,“How to share a secret,”Communications of the Association for Computing Machinery, Vol. 22, pp. 612-613, 1979. [SHYU13] S.J. Shyu and H.W. Jiang,“General constructions for threshold multi-ple-secret visual cryptography Schemes,”IEEE Transactions on Infor-mation Forensics Security, Vol. 8, pp. 733-743, 2013. [THIE02] C.C. Thien and J.C. Lin,“Secret image sharing,”Computer & Graphics, Vol. 26, pp. 765-770, 2002. [WU11] C.C. Wu, S.J. Kao, and M.S. Hwang,“A high quality image sharing with steganography and adaptive authentication scheme,”Journal of Systems and Software, Vol. 84, pp. 2196-2207, 2011. [WEI15] S.C. Wei, Y.C. Hou, and Y.C. Lu,“A technique for sharing a digital im-age,”Computers Standards & Interfaces, Vol. 40, pp. 53-61, 2015. [WU18] X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu,“Improving recovered image quality in secret Image sharing by simple modular arithmetic,” Signal Processing: Image Communication, Vol. 66, pp. 42-49, 2018. [YANG16] C.N. Yang, C.H. Chen, and S.R. Cai,“Enhanced Boolean-based multi secret image sharing scheme,”Journal of Systems and software, Vol. 116, pp. 22-34, 2016. [YANG17] C.N. Yang, C.H. Wu, Z.X. Yeh, D. Wang, and C. Kim,“A new sharing digital image scheme with clearer shadow images,”Computer Standards & Interfaces, Vol. 51, pp. 118-131, 2017. [YANG17] C.N. Yang, C.C. Wu, and Y.C. Lin“k out of n region-based progressive visual cryptography,”IEEE Transactions on Circuits and Systems for Video Technology, Vol.29, pp.252-262, 2019. [YANG18] C.N. Yang, F.H. Wu, and S.L. Peng,“Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph,”Journal of Visual Communication and Image Representation, Vol. 55, pp. 660-676, 2018. [ZHOU18] Z. Zhou, C.N. Yang, and Y. Cao, and X. Sun,“Secret image sharing based on encrypted pixels,”IEEE Access, Vol. 6, pp. 15021-15025, 2018.
|