1 |
W. Zhu, C. Luo, J. Wang, and S. Li, "Multimedia Cloud Computing," IEEE Signal Processing Magazine, Vol. 28, Issue 3, pp. 59-69, 2011.
DOI
ScienceOn
|
2 |
G.R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of International Workshop on the National Computer Conference of IEEE Computer Society, pp. 313-317, 1979.
|
3 |
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, Vol. 9, Issue 2, pp. 50-57, 2011.
DOI
ScienceOn
|
4 |
M. Lori, "Data Security in the World of Cloud Computing," IEEE Computer and Reliability Societies, Vol. 7, Issue 4, pp. 61-64, 2009.
|
5 |
A. Shamir, "How to Share a Secret," Communication of the ACM, Vol. 22, Issue 11, pp. 612-613, 1979.
DOI
ScienceOn
|
6 |
M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp. 1-12, 1995.
|
7 |
C.C. Thien and J.C. Lin, "Secret Image Sharing," Journal of Computers and Graphics, Vol. 26, Issue 5, pp. 765-770, 2002.
DOI
ScienceOn
|
8 |
K.J. Kim, S.H. Shin, and K.Y. Yoo, "A New Information Data hiding Scheme based on Pattern Information of Secret Data," Journal of Korea Multimedia Society, Vol. 15, Issue 4, pp. 526-539, 2012.
과학기술학회마을
DOI
ScienceOn
|
9 |
S.I. Hyun, S.H. Shin, and K.Y. Yoo, "A Proactive Secret Image Sharing Scheme over GF(28)," Journal of Korea Multimedia Society, Vol. 16, Issue 5, pp. 577-590, 2013.
과학기술학회마을
DOI
ScienceOn
|
10 |
B.J. Jang, S.H. Lee, and K.R. Kwon, "Active Video Watermarking Technique for Infectious Information Hiding System," Journal of Korea Multimedia Society, Vol. 15, Issue 8, pp. 1017-1030, 2012.
과학기술학회마을
DOI
ScienceOn
|
11 |
D.R. Stinson, Cryptography: theory and practice, CRC Press, 2005, Upper Saddle River, NJ 07458, USA.
|
12 |
P.Y. Lin and C.S. Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.
DOI
|
13 |
A. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, N.W., Boca Raton, FL 33431, USA.
|
14 |
M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast Via the Cover Base," Proceedings of International Workshop Cambridge, Security Protocols, Lecture Notes in Computer Science 1189, pp. 197-202, 1997.
|
15 |
C.C. Lin and W.H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, Issue 3, pp. 405-414, 2004.
DOI
ScienceOn
|
16 |
R.Z. Wang and S.J. Shyu, "Scalable Secret Image Sharing," Journal of Signal Processing: Image Communication, Vol. 22, Issue 4, pp. 363-373, 2007.
DOI
|
17 |
C.C. Chang, Y.P. Hsieh, and C.H. Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, Issue 10, pp. 3130-3137, 2008.
DOI
|