-
1
-
-
0001875459
-
-
Springer, Berlin, Germany pp. 1-12
-
Noar N., and Shamir A. Visual Cryptography, Advances in Cryptology: Eurocrypt'94 (1995), Springer, Berlin, Germany pp. 1-12
-
(1995)
Visual Cryptography, Advances in Cryptology: Eurocrypt'94
-
-
Noar, N.1
Shamir, A.2
-
2
-
-
0033078023
-
Visual cryptography and threshold schemes
-
Stinson D.R. Visual cryptography and threshold schemes. IEEE Potentials 18 1 (1999) 13-16
-
(1999)
IEEE Potentials
, vol.18
, Issue.1
, pp. 13-16
-
-
Stinson, D.R.1
-
3
-
-
33244471538
-
Efficient visual secret sharing scheme for color images
-
Shyu S.J. Efficient visual secret sharing scheme for color images. Pattern Recognition 39 5 (2006) 866-880
-
(2006)
Pattern Recognition
, vol.39
, Issue.5
, pp. 866-880
-
-
Shyu, S.J.1
-
4
-
-
10044234907
-
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
-
Yang C.N., and Chen T.S. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition 26 2 (2005) 193-206
-
(2005)
Pattern Recognition
, vol.26
, Issue.2
, pp. 193-206
-
-
Yang, C.N.1
Chen, T.S.2
-
5
-
-
85062838317
-
Safeguarding cryptographic keys
-
American Federation of Information Processing Societies, NY, USA
-
Blakley G.R. Safeguarding cryptographic keys. Proceedings of the National Computer Conference (1979), American Federation of Information Processing Societies, NY, USA 313-317
-
(1979)
Proceedings of the National Computer Conference
, pp. 313-317
-
-
Blakley, G.R.1
-
6
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 22 11 (1979) 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
33646098909
-
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
-
Yang C.N., and Chen T.S. Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition 39 7 (2006) 1300-1314
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1300-1314
-
-
Yang, C.N.1
Chen, T.S.2
-
8
-
-
0347946754
-
An image-sharing method with user-friendly shadow images
-
Thien C.C., and Lin J.C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Systems 13 12 (2003) 1161-1169
-
(2003)
IEEE Trans. Circuits Systems
, vol.13
, Issue.12
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
9
-
-
34547467334
-
User-friendly image sharing using polynomials with different primes
-
Yang C.N., Yu K.H., and Lukac R. User-friendly image sharing using polynomials with different primes. Int. J. Imaging Systems Technol. 17 1 (2007) 40-47
-
(2007)
Int. J. Imaging Systems Technol.
, vol.17
, Issue.1
, pp. 40-47
-
-
Yang, C.N.1
Yu, K.H.2
Lukac, R.3
-
10
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. J. Systems Software 73 3 (2004) 405-414
-
(2004)
J. Systems Software
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
11
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
12
-
-
34248584507
-
Improvements of image sharing with steganography and authentication
-
Yang C.N., Chen T.S., Yu K.H., and Wang C.C. Improvements of image sharing with steganography and authentication. J. Systems Software 80 7 (2007) 1070-1076
-
(2007)
J. Systems Software
, vol.80
, Issue.7
, pp. 1070-1076
-
-
Yang, C.N.1
Chen, T.S.2
Yu, K.H.3
Wang, C.C.4
-
13
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141 1-2 (2002) 123-138
-
(2002)
Inf. Sci.
, vol.141
, Issue.1-2
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
14
-
-
0031996445
-
Exploring steganography: seeing the unseen
-
Johnson N.F., and Jajodia S. Exploring steganography: seeing the unseen. IEEE Comput. 31 2 (1998) 26-34
-
(1998)
IEEE Comput.
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
16
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett 24 9-10 (2003) 1613-1626
-
(2003)
Pattern Recognition Lett
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
17
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 474-496
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 474-496
-
-
Chan, C.K.1
Cheng, L.M.2
-
18
-
-
0037411306
-
Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy
-
Chang C.C., Hsiao J.Y., and Chan C.S. Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 7 (2003) 1583-1595
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
19
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
20
-
-
33644985948
-
Image hiding scheme with modulus function and dynamic programming
-
Chang C.C., Chan C.S., and Fan Y.H. Image hiding scheme with modulus function and dynamic programming. Pattern Recognition 39 6 (2006) 1155-1167
-
(2006)
Pattern Recognition
, vol.39
, Issue.6
, pp. 1155-1167
-
-
Chang, C.C.1
Chan, C.S.2
Fan, Y.H.3
-
21
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
22
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164 1 (2005) 99-116
-
(2005)
Appl. Math. Comput.
, vol.164
, Issue.1
, pp. 99-116
-
-
Wang, S.J.1
-
23
-
-
0036794537
-
Secret image sharing
-
Thien C.C., and Lin J.C. Secret image sharing. Comput. Graphics 26 5 (2002) 765-770
-
(2002)
Comput. Graphics
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.C.1
Lin, J.C.2
|