A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy
Tài liệu tham khảo
Shamir, 1979, How to share a secret, Communications of the ACM, 22, 612, 10.1145/359168.359176
Blakley, 1979, Safeguarding cryptographic keys, 88
Naor, 1995, Visual cryptography, Lect Notes Comput Sci, 950, 1
Yang, 2004, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, 25, 486, 10.1016/j.patrec.2003.12.011
Weir, 2010, A comprehensive study of visual cryptography, 70
Liu, 2010, Step construction of visual cryptography schemes, Inf Forensics Secur IEEE Trans, 5, 27, 10.1109/TIFS.2009.2037660
Chen, 2011, Threshold visual secret sharing by random grids, J Syst Softw, 84, 1197, 10.1016/j.jss.2011.02.023
Wang, 2013, Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Trans Inf Forensics Secur, 8, 2059, 10.1109/TIFS.2013.2281108
Wu, 2014, Extended capabilities for XOR-based visual cryptography, IEEE Trans Inf Forensics Secur, 9, 1592, 10.1109/TIFS.2014.2346014
Yan, 2017, Contrast-improved visual secret sharing based on random grid for general access structure, Digit Signal Process, 71, 36, 10.1016/j.dsp.2017.08.006
Jia, 2018, Collaborative visual cryptography schemes, IEEE Trans Circt Syst Video Technol, 28, 1056, 10.1109/TCSVT.2016.2631404
Jia, 2018, An efficient XOR-based verifiable visual cryptographic scheme, Multimed Tools Appl, 1
Wu, 2019, Random grid based color visual cryptography scheme for black and white secret images with general access structures, Signal Process, 75, 100
Thien, 2002, Secret image sharing, Comput Graph, 26, 765, 10.1016/S0097-8493(02)00131-0
Thien, 2003, An image-sharing method with user-friendly shadow images, IEEE TransCirct SystVideo Technol, 13, 1161
Lin, 2004, Secret image sharing with steganography and authentication, J SystSoftw, 73, 405
Wang, 2006, Secret image sharing with smaller shadow images, Pattern Recognit Lett, 27, 551, 10.1016/j.patrec.2005.09.021
Yang, 2010, Constructions and properties of k out of n scalable secret image sharing, Opt Commun, 283, 1750, 10.1016/j.optcom.2009.12.077
Yang, 2015, Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Process, 31, 1
Ghebleh, 2017, A novel secret image sharing scheme using large primes, Multimed Tools Appl, 1
Kanso, 2017, An efficient (t, n)–threshold secret image sharing scheme, Multimed Tools Appl, 76, 16369, 10.1007/s11042-016-3917-x
Liu, 2017, Scalable secret image sharing scheme with essential shadows, Signal Process, 58, 49
Wu, 2018, Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process, 66, 42
Liu, 2018, Progressive (k, n) secret image sharing schemes based on boolean operations and covering codes, Signal Process, 66, 77
Wu, 2019, Invertible secret image sharing with steganography and authentication for AMBTC compressed images, Signal Process, 78, 437
Yan, 2019, A general progressive secret image sharing construction method, Signal Process, 71, 66
Wu, 2019, A combination of color-black-and-white visual cryptography and polynomial based secret image sharing, J Vis Commun Image Represent, 61, 74, 10.1016/j.jvcir.2019.03.020
Meghrajani, 2019, Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share, J Inf Secur Appl, 47, 267
Kabirirad, 2019, Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations, J Inf Secur Appl, 47, 16
Hu, 2019, A progressively essential secret image sharing scheme using hierarchy shadow, J Inf Secur Appl, 47, 371
Yan, 2019, Security analysis and classification of image secret sharing, J Inf Secur Appl, 47, 208
Zhao, 2009, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, 31, 252, 10.1016/j.csi.2007.10.012
Yang, 2007, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, 80, 1070, 10.1016/j.jss.2006.11.022
Lin, 2007, VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognit, 40, 3652, 10.1016/j.patcog.2007.04.001
Lin, 2010, Scalable secret image sharing with smaller shadow images, IEEE Signal Process Lett, 17, 316, 10.1109/LSP.2009.2038113
Yang, 2010, Image secret sharing method with two-decoding-options: lossless recovery and previewing capability, Image Vis Comput, 28, 1600, 10.1016/j.imavis.2010.04.003
Yang, 2011, A general (k, n) scalable secret image sharing scheme with the smooth scalability, J Syst Softw, 84, 1726, 10.1016/j.jss.2011.05.008
Yang, 2012, Steganography and authentication in image sharing without parity bits, Opt Commun, 285, 1725, 10.1016/j.optcom.2011.12.003
Li, 2013, Essential secret image sharing scheme with different importance of shadows, J Vis Commun Image Represent, 24, 1106, 10.1016/j.jvcir.2013.07.005
Chen, 2016, Two-layered structure for optimally essential secret image sharing scheme, J Vis Commun Image Represent, 38, 595, 10.1016/j.jvcir.2016.04.004
Srividhya, 2016, Implementation of tiOISSS with meaningful shadows and with an additional authentication image, J Vis Commun Image Represent, 38, 284, 10.1016/j.jvcir.2016.03.012
Wu, 2019, Partial reversible AMBTC-based secret image sharing with steganography, Digit Signal Process, 93, 22, 10.1016/j.dsp.2019.06.016