1 |
Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proc. AFIPS National Computer Conf., vol. 48, pp. 313-317.
|
2 |
Shamir, A., 1979. How to share a secret. Comm. ACM 22 (11), 612-613.
DOI
ScienceOn
|
3 |
Naor, M., Shamir, A., 1995. Visual Cryptography. Advances in Cryptology: Eurocrypt'94. Spring-Verlag, Berlin. pp. 1-12.
|
4 |
Chen, T.H., Tsao, K.H., 2009. Visual secret sharing by random grids revisited. Pattern Recognition 42 (9), 2203-2217.
DOI
|
5 |
Shamir, A., Naor, M., 1996. Visual cryptography II: Improving the contrast via the cover base. Security Comm. Networks, 16-17.
|
6 |
Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. J. Syst. Software 73 (3), 405-414.
DOI
ScienceOn
|
7 |
Beimel, A., Chor, B., 1998. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory 44 (5), 1887-1896.
DOI
|
8 |
Park, Y. B., Park, J. I., 2002. A Study on the Cipher JPEG Img, Journal of the Korea Academia-Industrial cooperation Society, vol.3, no.4, pp.308-312, 2002.
|
9 |
Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H., 2008. A novel secret image sharing scheme in color images using small shadow images. Inform. Sci. 178 (11), 2433-2447.
DOI
ScienceOn
|
10 |
Chang, C.C., Hsieh, Y.P., Lin, C.H., 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41 (10), 3130-3137.
DOI
|
11 |
Lin, P.Y., Lee, J.S., Chang, C.C., 2009. Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42 (5), 886-895.
DOI
|
12 |
Kim, C., 2013. (2, 2) Secret Sharing Using Data Hiding and Multiplexer Technique, The Journal of The Institute of Internet, Broadcasting and Communication, vol.13, no.4, pp.75-81.
과학기술학회마을
DOI
|
13 |
Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1), 765-770.
DOI
ScienceOn
|
14 |
Wang, R.Z., Su, C.H., 2006. Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27 (6), 551-555.
DOI
ScienceOn
|
15 |
Wang, D., Zhang, L., Ma, N., Li, X., 2007. Two secret sharing schemes based on Boolean operations. Pattern Recognition 40 (10), 2776-2785.
DOI
ScienceOn
|
16 |
Wu, Y.S., Thien, C.C., Lin, J.C., 2004. Sharing and hiding secret images with size constraint. Pattern Recognition 37 (7), 1377-1385.
DOI
|
17 |
Kim, C., 2014. Data hiding by an improved exploiting modification direction, Multimedia Tools and Applications, vol.69, no.3, pp 569-584.
DOI
ScienceOn
|
18 |
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., 2007. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 (7), 1070-1076.
DOI
ScienceOn
|