Cryptography Reference
In-Depth Information
[19] C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang. Improvements of image
sharing with steganography and authentication.
Journal of Systems &
Software, 80:1070{1076, 2007.
[20] C.N. Yang and C.B. Ciou. Image secret sharing method with two-
decoding-options: lossless recovery and previewing capability. Image and
Vision Computing, 28:1600{1610, 2010.
[21] C.N. Yang, K.H. Yu, and R. Lukac. User-friendly image sharing using
polynomials with different primes. International Journal of Imaging Sys-
tems and Technology, 17:40{47, 2007.
 
Search WWH ::




Custom Search