참고문헌
- W. Stallings, Cryptography and Network Security, Prentice Hall, 5rd Edtion, 2010, Upper Saddle River, NJ, USA.
- A. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, Boca Raton, FL, USA.
- A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612- 613, 1979. https://doi.org/10.1145/359168.359176
- G.R. Blakley, "Safeguarding Cryptographic Keys," Managing Requirements Knowledge, Proc. International Workshop on the National Computer Conference, pp. 313- 317, 1979.
- I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in J apan (Part III : Fundamental Electronic Science), Vol. 72, Issue 9, pp. 1520-6440, 1989.
- S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology- CRYPTO' 99, Lecture Notes in Computer Science 1666, pp. 148-164, 1999
- F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proc. 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987.
- B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO' 88, Lecture Notes in Computer Science 403, pp. 27-35, 1990.
- C-C Chang and R-J Hwang, "Efficient Cheater Identification Method for Threshold Schemes," IEE Proceedings of Computers & Digital Techcuques, Vol. 144, No. 1, pp. 23-27, 1997. https://doi.org/10.1049/ip-cdt:19970821
- A. Beimel and B. Chor, "Secret Sharing with Public Reconstruction," IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998. https://doi.org/10.1109/TIT.1998.705566
- M. Naor and A. Shamir, "Visual Cryptography," EUROCRYPT' 94, Lecture Notes in Computer Science 950, pp. 1-12, 1995.
- M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast Via the Cover Base," EUROCRYPT' 96, Lecture Notes in Computer Science 1189, pp. 197-202, 1997.
- C-C Thien and J-C Lin, "Secret Image Sharing," Journal of Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002. https://doi.org/10.1016/S0097-8493(02)00131-0
- C-C Lin and W-H Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004. https://doi.org/10.1016/S0164-1212(03)00239-5
- Y-S Wu, C-C Thien and J-C Lin, "Sharing and Hiding Secret Images with Size Constraint," Journal of Pattern Recognition, Vol. 37, No. 7, pp. 1377-1385, 2004. https://doi.org/10.1016/j.patcog.2004.01.002
- R-Z Wang and S-J Shyu, "Scalable Secret Image Sharing," Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007. https://doi.org/10.1016/j.image.2006.12.012
- C-C Chang, Y-P Hsieh and C-H Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008. https://doi.org/10.1016/j.patcog.2008.04.006
- P-Y Lin and C-S Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010. https://doi.org/10.1016/j.patrec.2010.01.019
- M. Tompa and H. Woll, "How To Share a Secret with Chearters," Journal of Cryptology, Vol. 1, No. 2, pp. 133-138, 1988.
- A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Proc. the 15th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO' 95), pp. 339-352, 1995.
- A. Cheddad, J. Condell, K. Curran and P. McKevitt, "Digital Image Steganography: Survey and Analysis of Current Methods," Journal of Signal Processing, Vol. 90, No. 3, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
- B. Li, J. He, J. Huang and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142- 172, 2011.
- 김기종, 신상호, 유기영, "비밀데이터의 패턴정보에 기반한 새로운 정보은익 기법," 멀티미디어학회논문지, 제15권, 제4호, pp. 526-539, 2012.
- 장봉주, 이석환, 권기룡, "전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법," 멀티미디어학회논문지, 제15권, 제8호, pp. 1017-1030, 2012.
피인용 문헌
- Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure vol.17, pp.8, 2014, https://doi.org/10.9717/kmms.2014.17.8.953
- Security of a kind of quantum secret sharing with entangled states vol.7, pp.1, 2017, https://doi.org/10.1038/s41598-017-02543-0
- Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images vol.18, pp.11, 2015, https://doi.org/10.9717/kmms.2015.18.11.1332