参考文献
|
-
Blakley, G. R.(1979).Safeguarding cryptographic keys.Proceedings of AFIPS National Computer Conference
-
Chang, C. C.,Hsieh, Y. P.,Lin, C. H.(2008).Sharing secrets in stego images with authentication.Pattern Recognition,41(10),3130-3137.
-
Chang, C. C.,Lin, C. C.,Lin, C. H.,Chen, Y. H.(2008).A novel secret image sharing scheme in color images using small shadow images.Information Sciences,178(11),2433-2447.
-
Chang, C. C.,Lin, C. Y.,Tseng, C. S.(2007).Secret image hiding and sharing based on the (t, n)-threshold.Fundamenta Informaticae,76(4),399-411.
-
Chang, C. C.,Lin, P. Y.,Chuang, J. C.(2010).A grayscale image steganography based upon discrete cosine transformation.Journal of Digital Information Management,8(2),88-94.
-
Chang, C. C.,Lin, P. Y.,Chuang, J. C.(2007).A fragile watermarking scheme for digital images authentication using pixel-difference.Imaging Science Journal,55(3),140-147.
-
Chang, C. C.,Lin, P. Y.,Wang, H. C.(2009).Distortion-free steganography mechanism with compression to VQ Indices.International Journal of Signal Processing, Image Processing and Pattern Recognition,2(2),91-104.
-
Eslami, Z.,Razzaghi, S. H.,Ahmadabadi, J. Zarepour(2010).Secret image sharing based on cellular automata and steganography.Pattern Recognition,43(1),397-404.
-
Kim, K. S.,Lee, M. J.,Lee, H. Y.,Lee, H. K.(2009).Reversible data hiding exploiting spatial correlation between sub-sample images.Pattern Recognition,42(11),3083-3096.
-
Lin, C. C.,Tsai, W. H.(2004).Secret image sharing with steganography and authentication.The Journal of Systems and Software,73(3),405-414.
-
Lin, P. Y.,Lee, J. S.,Chang, C. C.(2009).Distortion-free secret image sharing mechanism using modulus operator.Pattern Recognition,42(5),886-895.
-
Shamir, A.(1979).How to share a secret.Communications of the ACM,22(11),612-613.
-
Thien, B. C.,Lin, J. C.(2002).Secret image sharing.Computer & Graphics,26(1),765-770.
-
Wang, R. Z.,Shyu, S. J.(2007).Scalable secret image sharing.Signal Processing: Image Communication,22(4),363-373.
-
Wang, X.,Li, X.,Yang, B.,Guo, Z.(2010).Efficient generalized integer transform for reversible watermarking.IEEE Signal Processing Letters,17(6),567-570.
-
Wu, Y. S.,Thien, C. C.,Lin, J. C.(2004).Sharing and hiding secret images with size constraint.Pattern Recognition,37(7),1377-1385.
-
Yang, C. N.,Chen, T. S.,Yu, K. H.,Wang, C. C.(2007).Improvements of image sharing with steganography and authentication.The Journal of Systems and Software,80(7),1070-1076.
-
Zhao, R.,Zhao, J. J.,Dai, F.,Zhao, F. Q.(2009).A new image secret sharing scheme to identify cheaters.Computer Standards & Interfaces,31(1),252-257.
|