Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images |
Jeon, Byoung-Hyun
(Dept. of Computer Info & Communication, Yeungjin Cyber College)
Shin, Sang-Ho (Realistic Media Result Product Promotion Group, Dongguk University Gyeongju Campus) Jung, Ki-Hyun (Dept. of Cyber Security, Kyungil University) Lee, Joon-Ho (6th R&D Institute, Agency for Defense Development) Yoo, Kee-Young (School of Compuer Science and Engineering, Kyungpook National University) |
1 | F. Paul, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," Proceeding of 28th Annual Symposium on Foundations of Computer Science, pp. 427-438, 1987. |
2 | D.R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC Press, United States of America, 2006. |
3 | S. William, Cryptography and Network Security, Prentice Hall, United States of America, 2006. |
4 | A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, United States of America, 1996. |
5 | A. Shamir, “How to Share a Secret,” Communications of ACM, Vol. 22, No. 11, pp. 612-613, 1979. DOI |
6 | I. Mitsuru, S. Akira, and N. Takao, "Secret Sharing Scheme Realizing General Access Structure," Electronics and Communications in Japan, Vol. 72, Issue 9, pp. 1520-6440, 1989. |
7 | S. Berry, "A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting," Advances in Cryptology-CRYPTO'99 Lecture Notes in Computer Science, Vol. 1666, pp. 148-164, 1999. |
8 | B. Josh and L. Jerry, "Generalized Secret Sharing and Monotone Functions," Advances in Cryptology-CRYPTO'88 Lecture Notes in Computer Science, Vol. 403, pp. 27-35, 1990. |
9 | A. Beimel and B. Chor, “Secret Sharing with Public Reconstruction,” IEEE Transactions on Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998. DOI |
10 | C. Thien and J. Lin, “Secret Image Sharing,” Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002. DOI |
11 | C. Thien and J. Lin, “An Image Sharing Method with User-friendly Shadow Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161-1169, 2003. DOI |
12 | C. Yang, T. Chen, K. Yu, and C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems & Software, Vol. 80, No. 7, pp. 1070-1076, 2007. DOI |
13 | C. Lin and W. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004. DOI |
14 | U. Mustafa, G. Ulutas, and V.V. Nabiyev, “Invertible Secret Image Sharing for Gray Level and Dithered Cover Images,” Journal of Systems and Software, Vol. 86, No. 2, pp. 485-500, 2013. DOI |
15 | R. Wang and S. Shyu, “Scalable Secret Image Sharing,” Journal of Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363-373, 2007. DOI |
16 | C. Chang, Y. Hsieh, and C. Lin, “Sharing Secrets in Stego Images with Authentication,” Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008. DOI |
17 | C. Lin, L. Liao, K. Hwang, and S. Chen, “Reversible Secret Image Sharing with High Visual Quality,” Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1729-1747, 2014. DOI |
18 | B. Jeon, G. Lee, K. Jung and K. Yoo, “Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion,” Journal of Korea Multimedia Society, Vol. 17, No. 7, pp. 849-857, 2014. DOI |
19 | X. Zhang, “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, Vol. 18, No. 4 pp. 255-258, 2011. DOI |
20 | W. Hong, T. Chen, and H. Wu, “An Improved Reversible Data Hiding in Encrypted Images using Side Match,” IEEE Signal Processing Letters, Vol. 19, No. 4 pp. 199-202, 2012. DOI |
21 | B. Jang, S. Lee, and K. Kwon, “Active Video Watermarking Technique for Infectious Information Hiding System,” Journal of Korea Multimedia Society, Vol. 15, No. 8, pp. 1017-1030, 2012 DOI |
22 | S. Hyun, S. Shin, and K. Yoo, “A Proactive Secret Image Sharing Scheme over GF(28),” Journal of Korea Multimedia Society, Vol. 16, No. 5, pp. 577-590, 2013. DOI |