참고문헌
- A. Shamir, "How to share a secret," Communications of the Association for Computing Machinery, pp.612-613, 1979.
- Moni Naor, Adi Shamir: "Visual Cryptography," EUROCRYPT, pp.1-12, 1994.
- C.C. Thien, J.C. Lin, "Secret image sharing," Computers and Graphics, vol. 26, no. 1, pp. 765- 770, 2002. https://doi.org/10.1016/S0097-8493(02)00131-0
- C.C. Chang, C.C. Lin, C.H. Lin, Y.H. Chen, "A novel secret image sharing scheme in color images using small shadow images," Information Sciences, vol. 178, no.11, pp.2433-2447, 2008. https://doi.org/10.1016/j.ins.2007.12.016
- C.C. Chang, C.Y. Lin, C.S. Tseng, "Secret image hiding and sharing based on the (t,n)-threshold," Fundamenta Informaticae, vol. 76, no. 4, pp.399- 411, 2007.
- J.B. Feng, H.C. Wu, C.S. Tsai, Y.P. Chu, "A new multi-secret images sharing scheme using Lagrange's interpolation," Journal of Systems and Software, vol. 76, no. 3, pp. 327-339, 2005. https://doi.org/10.1016/j.jss.2004.07.250
- S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang, K. Chen, "Sharing multiple secrets in visual cryptography," Pattern Recognition, vol. 40, no. 12, pp. 3633-3651, 2007. https://doi.org/10.1016/j.patcog.2007.03.012
- D.S. Tsai, G. Horng, Z.H. Chen, Y.T. Huang, "A novel secret image sharing scheme for true-color images with size constraint," Information Sciences, vol. 179, no. 19, pp.3247-3254, 2009. https://doi.org/10.1016/j.ins.2009.05.020
- C.S. Tsai, C.C. Chang, T.S. Chen, "Sharing multiple secrets in digital images," Journal of Systems and Software, vol. 64, no. 2, pp.163-170, 2002. https://doi.org/10.1016/S0164-1212(02)00034-1
- C.C. Chang, Y.P. Hsieh, C.H. Lin, "Sharing secrets in stego images with authentication," Pattern Recognition, vol.141, no.10, pp.3130-3137, 2008.
- C.C. Lin, W.H. Tsai, "Secret image sharing with steganography and authentication," Journal of Systems and Software, vol.73, no.3, pp. 405-414, 2004 https://doi.org/10.1016/S0164-1212(03)00239-5
- C.N. Yang, T.S. Chen, K.H. Yu, C.C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and Software, vol.80, no.7, pp.1070-1076, 2007. https://doi.org/10.1016/j.jss.2006.11.022
- Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai, Y.P. Chu, "A multiple-level visual secret-sharing scheme without image size expansion," Information Sciences, vol. 177, no. 21, pp.4696-4710, 2007. https://doi.org/10.1016/j.ins.2007.05.011
- W.P. Fang, "Friendly progressive visual secret sharing," Pattern Recognition, vol. 41, no. 4, pp. 2008.
- D.C. Lou, H.K. Tso, J.L. Liu, "A copyright protection scheme for digital images using visual cryptography technique," Computer Standards and Interfaces, vol. 29, pp.125-131, 2007. https://doi.org/10.1016/j.csi.2006.02.003
- R. Lukac, K.N. Plataniotis, "Bit-level based secret sharing for image encryption," Pattern Recognition, vol. 38, no. 5, pp.767-772, 2005. https://doi.org/10.1016/j.patcog.2004.11.010
- M. Naor, A. Shamir, "Visual cryptography," in: Advances in Cryptology-EuroCrypt'94, LNCS, Springer, Berlin, vol. 950, pp.1-2, 1995.
- Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: "Sharing a verifiable secret image using two shadows," Pattern Recognition, vol. 42, no.11, pp. 3097-3114, 2009. https://doi.org/10.1016/j.patcog.2009.04.012
- J. Cai, A Short Survey On Visual Cryptography Schemes, 2004, Available: http://www.cs.toronto.edu/-jcai/paper.pdf
- J.K. Moon, J.M. Kim, H.R. Kim, A Secure Authentication Protocol for Cloud Services, Journal of Advanced Information Technology and Convergence, vol.1, no.2, pp.33-36, 2011. https://doi.org/10.5121/ijait.2011.1603
- J.K. Baek, J.P. Park, A Study on Personal Information Control and Security in Printed Matter, Journal of the Korea Academia Industrial, vol.14, no.5, pp.2415-2421, 2013. https://doi.org/10.5762/KAIS.2013.14.5.2415
피인용 문헌
- Secret Sharing based on DCT using XOR vol.14, pp.4, 2014, https://doi.org/10.7236/JIIBC.2014.14.4.13