1 |
W. Stallings, Cryptography and Network Security, Prentice Hall, 5rd Edtion, 2010, Upper Saddle River, NJ, USA.
|
2 |
A. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, Boca Raton, FL, USA.
|
3 |
A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612- 613, 1979.
DOI
ScienceOn
|
4 |
G.R. Blakley, "Safeguarding Cryptographic Keys," Managing Requirements Knowledge, Proc. International Workshop on the National Computer Conference, pp. 313- 317, 1979.
|
5 |
I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in J apan (Part III : Fundamental Electronic Science), Vol. 72, Issue 9, pp. 1520-6440, 1989.
|
6 |
S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology- CRYPTO' 99, Lecture Notes in Computer Science 1666, pp. 148-164, 1999
|
7 |
F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proc. 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987.
|
8 |
B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO' 88, Lecture Notes in Computer Science 403, pp. 27-35, 1990.
|
9 |
C-C Chang and R-J Hwang, "Efficient Cheater Identification Method for Threshold Schemes," IEE Proceedings of Computers & Digital Techcuques, Vol. 144, No. 1, pp. 23-27, 1997.
DOI
ScienceOn
|
10 |
A. Beimel and B. Chor, "Secret Sharing with Public Reconstruction," IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998.
DOI
|
11 |
M. Naor and A. Shamir, "Visual Cryptography," EUROCRYPT' 94, Lecture Notes in Computer Science 950, pp. 1-12, 1995.
|
12 |
M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast Via the Cover Base," EUROCRYPT' 96, Lecture Notes in Computer Science 1189, pp. 197-202, 1997.
|
13 |
C-C Thien and J-C Lin, "Secret Image Sharing," Journal of Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002.
DOI
ScienceOn
|
14 |
C-C Chang, Y-P Hsieh and C-H Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008.
DOI
ScienceOn
|
15 |
C-C Lin and W-H Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004.
DOI
ScienceOn
|
16 |
Y-S Wu, C-C Thien and J-C Lin, "Sharing and Hiding Secret Images with Size Constraint," Journal of Pattern Recognition, Vol. 37, No. 7, pp. 1377-1385, 2004.
DOI
ScienceOn
|
17 |
R-Z Wang and S-J Shyu, "Scalable Secret Image Sharing," Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007.
DOI
ScienceOn
|
18 |
P-Y Lin and C-S Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.
DOI
ScienceOn
|
19 |
M. Tompa and H. Woll, "How To Share a Secret with Chearters," Journal of Cryptology, Vol. 1, No. 2, pp. 133-138, 1988.
|
20 |
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Proc. the 15th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO' 95), pp. 339-352, 1995.
|
21 |
A. Cheddad, J. Condell, K. Curran and P. McKevitt, "Digital Image Steganography: Survey and Analysis of Current Methods," Journal of Signal Processing, Vol. 90, No. 3, pp. 727-752, 2010.
DOI
ScienceOn
|
22 |
B. Li, J. He, J. Huang and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142- 172, 2011.
|
23 |
김기종, 신상호, 유기영, "비밀데이터의 패턴정보에 기반한 새로운 정보은익 기법," 멀티미디어학회논문지, 제15권, 제4호, pp. 526-539, 2012.
|
24 |
장봉주, 이석환, 권기룡, "전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법," 멀티미디어학회논문지, 제15권, 제8호, pp. 1017-1030, 2012.
|