1 |
C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, "Improvements of Image Sharing with Steganography and Authentication," The Journal of Systems and Software, Vol. 80, No. 7, pp. 1070-1076, 2007.
DOI
ScienceOn
|
2 |
C.C. Chang, Y.P. Hsieh, and C.H. Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008.
DOI
|
3 |
S.J. Shyu and Y.R. Chen, "Threshold Secret Image Sharing by Chinese Remainder Theorem," Proceeding of IEEE Asia-Pacific Services Computing Conference, pp. 1332-1337, 2008.
|
4 |
P.Y. Lin, J.S. Lee, and C.C Chang, "Distortionfree Secret Image Sharing Mechanism using Modulus Operator," Pattern recognition, Vol. 42, No. 5, pp. 886-895, 2009.
DOI
|
5 |
P.Y. Lin and C.S. Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.
DOI
|
6 |
Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.
DOI
ScienceOn
|
7 |
P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol. 89, No. 6, pp. 1129-1143, 2009.
DOI
ScienceOn
|
8 |
S.H. Bae, "A High Capacity Reversible Watermarking using Histogram Shifting," Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.
과학기술학회마을
|
9 |
J. Tian, "Reversible Watermarking by Difference Expansion," IEEE Transactions on Circuits and System for Video Technology, Vol. 13, Issue 8, pp. 890-896, 2003.
DOI
ScienceOn
|
10 |
B. Li, J. He, J. Huang, and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia signal Processing, Vol. 2, No. 2, pp. 142- 172. 2011.
|
11 |
K.J. Kim, S.H. Shin, and K.Y. Yoo, "A New Information Data hiding Scheme based on Pattern Information of Secret Data," Journal of Korea Multimedia Society, Vol. 15, No. 4, pp. 526-539, 2012.
DOI
ScienceOn
|
12 |
W. Stallings, Cryptography and Network Security, Prentice Hall, USA, 2010.
|
13 |
G.R. Blakley, "Safeguarding Cryptographic Keys," Managing Requirements Knowledge, Proceeding of the International Workshop on the National Computer Conference, pp. 313-317, 1979.
|
14 |
A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
DOI
ScienceOn
|
15 |
C.C. Thien and J.C. Lin, "Secret Image Sharing," Journal of Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002.
DOI
ScienceOn
|
16 |
C.C. Lin and W.H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004.
DOI
ScienceOn
|
17 |
Y.S. Wu, C.C Thien, and J.C. Lin, "Sharing and Hiding Secret Images with Size Constraint," Journal of Patten Recognition, Vol. 37, No. 7, pp. 1377-1385, 2004.
DOI
|
18 |
C.Y. Yang and W.C. Hu, "High-Performance Reversible Data Hiding with Overflow/ Underflow Avoidance," ETRI Journal, Vol. 33, No. 5, pp. 580-588, 2011.
DOI
|