Cryptography Reference
In-Depth Information
[24] C.-C. Thien and J.-C. Lin, An Image-Sharing Scheme with User-Friendly
Shadow Images, IEEE Transactions on Circuits and Systems for Video
Technology, Vol. 13, No. 12, pp. 1161{1169, 2003.
[25] R.-Z. Wang and C.-H. Su, Secret Image Sharing with smaller Shadow
Images,
Pattern Recognition Letters, Vol. 27, No. 6, pp. 551{555, 2006.
[26] A. Wang, L. Zhang, N. Ma, and X. Li, Two Secret Sharing Schemes
Based on Boolean Operations, Pattern Recognition, Vol. 40, pp. 2776{
2785, 2007.
[27] N. Yang, New Visual Secret Sharing Schemes Using Probabilistic
Schemes, Pattern Recognition Letters, Vol. 25, No. 4, pp. 481{494, 2004.
[28] C.-N. Yang, T.-S. Chen, K.H. Yu, and C.-C. Wang, Improvements of Im-
age Sharing with Steganography and Authentication, Journal of Systems
and Software, Vol. 80, No. 7, pp. 1070{1076, 2007.
[29] R. Zhao, J.-J. Zhao, F. Dai, and F.-Q. Zhao, A new Image Secret Sharing
Scheme to Identify Cheaters, Computer Standards and Interfaces, Vol. 31,
No. 1, pp. 252{257, 2009.
 
Search WWH ::




Custom Search