Cryptography Reference
In-Depth Information
[3] G. Horng, T.H. Chen, and D.S. Tsai. Cheating in visual cryptography.
In Designs, Codes and Cryptography, volume 38, pages 219{236. Kluwer
Academic Publishers, 2006.
[4] C.C. Lin and W.H. Tsai. Secret image sharing with steganography au-
thentication. In The Journal of Systems Software, volume 24, pages 405{
414, 2004.
[5] S.P. Mohanty and B.K. Bhargava. Invisible watermarking based on cre-
ation and robust insertion-extraction of image adaptive watermarks. In
Transactions on Multimedia Computing, Communications, and Applica-
tions, volume 5 (12), pages 612{613, 1979.
[6] M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94,
Springer-Verlag Berlin, volume LNCS 950, pages 1{12, 1995.
[7] A. Shamir. How to share a secret. Communication of the ACM, 22:612{
613, November 1979.
[8] C. C. Thien and J. C. Lin.
Secret image sharing.
In Computers &
Graphics, volume 26, pages 765{770, 2002.
[9] R.-Z. Wang and S.-J. Shyu. Scalable secret image sharing. Image Com-
mun., 22:363{373, April 2007.
[10] S.-J. Wang, I.-S. Lin, Y.-L. Hsieh, and C.-Y. Weng. Secret sharing sys-
tems with authentication-based steganography. In Proceedings of the 2008
International Conference on Intelligent Information Hiding and Multime-
dia Signal Processing, IIH-MSP '08, pages 1146{1149, Washington, DC,
USA, 2008. IEEE Computer Society.
[11] C.-H. Yang. Inverted pattern approach to improve image quality of infor-
mation hiding by LSB substitution. Pattern Recognition, 41:2674{2683,
August 2008.
[12] C.-N. Yang, T.-S. Chen, K. H. Yu, and C.-C. Wang. Improvements of im-
age sharing with steganography and authentication. Journal of Systems
and Software, 80:1070{1076, July 2007.
[13] C.-N. Yang and S.-M. Huang. Constructions and properties of k out of n
scalable secret image sharing. Optics Communications, 283(9):1750{1762,
2010.
 
Search WWH ::




Custom Search