메뉴 건너뛰기




Volumn 41, Issue 12, 2008, Pages 3572-3581

Visual secret sharing for multiple secrets

Author keywords

Multiple secret sharing; Visual cryptography; Visual pattern; Visual secret sharing

Indexed keywords

CRYPTOGRAPHY; GRAPH THEORY; MATRIX ALGEBRA;

EID: 49449118313     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.05.031     Document Type: Article
Times cited : (142)

References (32)
  • 1
    • 85062838317 scopus 로고    scopus 로고
    • G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 48, NJ, USA, 1979, pp. 313-317.
    • G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 48, NJ, USA, 1979, pp. 313-317.
  • 2
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun. ACM 22 1 (1979) 612-613
    • (1979) Commun. ACM , vol.22 , Issue.1 , pp. 612-613
    • Shamir, A.1
  • 4
    • 0035605439 scopus 로고    scopus 로고
    • A copyright protection scheme of images based on visual cryptography
    • Chang C.-C., and Wu H.-C. A copyright protection scheme of images based on visual cryptography. Imaging Sci. J. 49 (2001) 141-150
    • (2001) Imaging Sci. J. , vol.49 , pp. 141-150
    • Chang, C.-C.1    Wu, H.-C.2
  • 5
    • 14744284326 scopus 로고    scopus 로고
    • A new multi-secret images sharing scheme using largrange's interpolation
    • Feng J.-B., Wu H.-C., Tsai C.-S., and Chu Y.-P. A new multi-secret images sharing scheme using largrange's interpolation. J. Syst. Software 76 (2005) 327-339
    • (2005) J. Syst. Software , vol.76 , pp. 327-339
    • Feng, J.-B.1    Wu, H.-C.2    Tsai, C.-S.3    Chu, Y.-P.4
  • 6
    • 23044529190 scopus 로고    scopus 로고
    • C.-S. Tsai, C.-C. Chang, A generalized secret image sharing and recovery scheme, in: Advanced in Multimedia Information Processing-PCM2001, Lecture Notes in Computer Science, Springer, Germany, vol. 2195, 2001, pp. 963-968.
    • C.-S. Tsai, C.-C. Chang, A generalized secret image sharing and recovery scheme, in: Advanced in Multimedia Information Processing-PCM2001, Lecture Notes in Computer Science, Springer, Germany, vol. 2195, 2001, pp. 963-968.
  • 7
    • 10444226634 scopus 로고    scopus 로고
    • A new repeating color watermarking scheme based on human visual model
    • Tsai C.-S., and Chang C.-C. A new repeating color watermarking scheme based on human visual model. Eurasip J. Appl. Signal Process. 13 (2004) 1965-1972
    • (2004) Eurasip J. Appl. Signal Process. , vol.13 , pp. 1965-1972
    • Tsai, C.-S.1    Chang, C.-C.2
  • 8
    • 0347927730 scopus 로고    scopus 로고
    • Sharing multiple secrets in digital images
    • Tsai C.-S., Chang C.-C., and Chen T.-S. Sharing multiple secrets in digital images. J. Syst. Software 64 2 (2002) 163-170
    • (2002) J. Syst. Software , vol.64 , Issue.2 , pp. 163-170
    • Tsai, C.-S.1    Chang, C.-C.2    Chen, T.-S.3
  • 9
    • 0345060338 scopus 로고    scopus 로고
    • Improved non-repudiable threshold proxy signature scheme with known signers
    • Tsai C.-S., Tzeng S.-F., and Hwang M.-S. Improved non-repudiable threshold proxy signature scheme with known signers. Informatica 14 3 (2003) 393-402
    • (2003) Informatica , vol.14 , Issue.3 , pp. 393-402
    • Tsai, C.-S.1    Tzeng, S.-F.2    Hwang, M.-S.3
  • 10
    • 1642274444 scopus 로고    scopus 로고
    • Hiding digital watermarks using fractal compression technique
    • Wu H.-C., and Chang C.-C. Hiding digital watermarks using fractal compression technique. Fundam. Inf. 58 (2003) 189-202
    • (2003) Fundam. Inf. , vol.58 , pp. 189-202
    • Wu, H.-C.1    Chang, C.-C.2
  • 11
    • 0347927731 scopus 로고    scopus 로고
    • Detection and restoration of tampered JPEG compressed images
    • Wu H.-C., and Chang C.-C. Detection and restoration of tampered JPEG compressed images. J. Syst. Software 64 (2002) 151-161
    • (2002) J. Syst. Software , vol.64 , pp. 151-161
    • Wu, H.-C.1    Chang, C.-C.2
  • 12
    • 84926193517 scopus 로고    scopus 로고
    • M. Naor, A. Shamir, Visual cryptography in: Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Springer, Germany, vol. 950, 1995, pp. 1-12.
    • M. Naor, A. Shamir, Visual cryptography in: Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Springer, Germany, vol. 950, 1995, pp. 1-12.
  • 13
    • 0035123204 scopus 로고    scopus 로고
    • On the practical secret sharing scheme
    • Koga W. On the practical secret sharing scheme. IEICE Trans. Fundam. E84-A 1 (2001) 256-261
    • (2001) IEICE Trans. Fundam. , vol.E84-A , Issue.1 , pp. 256-261
    • Koga, W.1
  • 14
    • 84978983299 scopus 로고    scopus 로고
    • M. Naor, A. Shamir, Visual cryptography II: improving the contrast via the cover base, in: Security Protocols, Lecture Notes in Computer Science, Springer, Germany, vol. 1189, April 1996, pp. 197-202.
    • M. Naor, A. Shamir, Visual cryptography II: improving the contrast via the cover base, in: Security Protocols, Lecture Notes in Computer Science, Springer, Germany, vol. 1189, April 1996, pp. 197-202.
  • 15
    • 0033078023 scopus 로고    scopus 로고
    • Visual cryptography and threshold schemes
    • Stinson D. Visual cryptography and threshold schemes. Potentials of IEEE 18 1 (1999) 13-16
    • (1999) Potentials of IEEE , vol.18 , Issue.1 , pp. 13-16
    • Stinson, D.1
  • 16
    • 0000049121 scopus 로고    scopus 로고
    • Constructions and properties of k-out-of-n visual secret sharing scheme
    • Verheul E.R., and van Tilborg H.C.A. Constructions and properties of k-out-of-n visual secret sharing scheme. Des. Codes Cryptography 1 2 (1997) 179-196
    • (1997) Des. Codes Cryptography , vol.1 , Issue.2 , pp. 179-196
    • Verheul, E.R.1    van Tilborg, H.C.A.2
  • 17
  • 18
    • 0036825941 scopus 로고    scopus 로고
    • The optimal n-out-of-n visual secret sharing scheme for gray-scale images
    • Iwamoto M., and Yamamoto H. The optimal n-out-of-n visual secret sharing scheme for gray-scale images. IEICE Trans. Fundam. E86-A 10 (2003) 2238-2247
    • (2003) IEICE Trans. Fundam. , vol.E86-A , Issue.10 , pp. 2238-2247
    • Iwamoto, M.1    Yamamoto, H.2
  • 19
    • 17444397757 scopus 로고    scopus 로고
    • Optimal colored threshold visual cryptography schemes
    • Cimato S., De Prisco R., and De Santis A. Optimal colored threshold visual cryptography schemes. Des. Codes Cryptogr. 35 (2005) 311-335
    • (2005) Des. Codes Cryptogr. , vol.35 , pp. 311-335
    • Cimato, S.1    De Prisco, R.2    De Santis, A.3
  • 20
    • 34249067468 scopus 로고    scopus 로고
    • S. Cimato, R. De Prisco, A. De Santis, Contrast optimal colored visual cryptography schemes, in: Proceedings of 2003 IEEE Information Theory Workshop, Paris, France, March-April 2003, pp. 139-142.
    • S. Cimato, R. De Prisco, A. De Santis, Contrast optimal colored visual cryptography schemes, in: Proceedings of 2003 IEEE Information Theory Workshop, Paris, France, March-April 2003, pp. 139-142.
  • 21
    • 0037411307 scopus 로고    scopus 로고
    • Visual cryptography for color images
    • Hou Y.-C. Visual cryptography for color images. Pattern Recognition 36 7 (2003) 1619-1629
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1619-1629
    • Hou, Y.-C.1
  • 22
    • 0036454464 scopus 로고    scopus 로고
    • New constructions of the lattice-based visual secret sharing scheme using mixture of colors
    • Ishihara T., and Koga H. New constructions of the lattice-based visual secret sharing scheme using mixture of colors. IEICE Trans. Fundam. E85-A 1 (2002) 158-166
    • (2002) IEICE Trans. Fundam. , vol.E85-A , Issue.1 , pp. 158-166
    • Ishihara, T.1    Koga, H.2
  • 23
    • 0042978503 scopus 로고    scopus 로고
    • A visual secret sharing scheme for color images based on meanvalue-color mixing
    • Ishihara T., and Koga H. A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86-A 1 (2003) 194-197
    • (2003) IEICE Trans. Fundam. , vol.E86-A , Issue.1 , pp. 194-197
    • Ishihara, T.1    Koga, H.2
  • 24
    • 0035119988 scopus 로고    scopus 로고
    • An analytic construction for the visual secret sharing scheme for color images
    • Koga H. An analytic construction for the visual secret sharing scheme for color images. IEICE Trans. Fundam. E84-A 1 (2001) 262-272
    • (2001) IEICE Trans. Fundam. , vol.E84-A , Issue.1 , pp. 262-272
    • Koga, H.1
  • 25
    • 49449115287 scopus 로고    scopus 로고
    • V. Rijmen, B. Preneel, Efficient color visual encryption or shared colors of Benetton, in: EUROCRYPTO'96, Rump Session, Berlin, Germany, 1996.
    • V. Rijmen, B. Preneel, Efficient color visual encryption or shared colors of Benetton, in: EUROCRYPTO'96, Rump Session, Berlin, Germany, 1996.
  • 26
    • 0000793737 scopus 로고    scopus 로고
    • New colored visual secret sharing schemes
    • Tang C.-H., and Laih C.-S. New colored visual secret sharing schemes. Des. Code Cryptogr. 20 (2000) 325-335
    • (2000) Des. Code Cryptogr. , vol.20 , pp. 325-335
    • Tang, C.-H.1    Laih, C.-S.2
  • 28
    • 0242496289 scopus 로고    scopus 로고
    • A construction method of visual secret sharing schemes for plural secret images
    • Iwamoto M., and Yamamoto H. A construction method of visual secret sharing schemes for plural secret images. IEICE Trans. Fundam. E86-A 10 (2003) 2577-2588
    • (2003) IEICE Trans. Fundam. , vol.E86-A , Issue.10 , pp. 2577-2588
    • Iwamoto, M.1    Yamamoto, H.2
  • 29
    • 0242498217 scopus 로고    scopus 로고
    • Extended visual cryptography for natural images
    • Nakajima M., and Yamaguchi Y. Extended visual cryptography for natural images. J. WSCG 10 2 (2002) 303-310
    • (2002) J. WSCG , vol.10 , Issue.2 , pp. 303-310
    • Nakajima, M.1    Yamaguchi, Y.2
  • 30
    • 49449088753 scopus 로고    scopus 로고
    • T.-S. Chen, J.-H. Shiesh, H.-W. Chen, Using circular shadow image and fixed angle segmentation for visual cryptography system, in: Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, Saga, Japan, March 2002, pp. 214-220.
    • T.-S. Chen, J.-H. Shiesh, H.-W. Chen, Using circular shadow image and fixed angle segmentation for visual cryptography system, in: Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, Saga, Japan, March 2002, pp. 214-220.
  • 31
    • 49449094850 scopus 로고    scopus 로고
    • L.-H. Chen, C.-C. Wu, A Study on Visual Cryptography, Master Thesis, National Chiao Tung University, Taiwan, ROC, 1998.
    • L.-H. Chen, C.-C. Wu, A Study on Visual Cryptography, Master Thesis, National Chiao Tung University, Taiwan, ROC, 1998.
  • 32
    • 2942672380 scopus 로고    scopus 로고
    • H.-C. Hsu, T.-S. Chen, Y.-H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp. 996-1001.
    • H.-C. Hsu, T.-S. Chen, Y.-H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp. 996-1001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.