-
1
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 22 11 (1979) 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
0032204204
-
Sharing secret images using shadow codebooks
-
Chang C.C., and Hwang R.J. Sharing secret images using shadow codebooks. Inf. Sci. 111 1 (1998) 335-345
-
(1998)
Inf. Sci.
, vol.111
, Issue.1
, pp. 335-345
-
-
Chang, C.C.1
Hwang, R.J.2
-
3
-
-
0036794537
-
Secret image sharing
-
Thien C., and Lin J. Secret image sharing. Comput. Graphics 26 1 (2002) 765-770
-
(2002)
Comput. Graphics
, vol.26
, Issue.1
, pp. 765-770
-
-
Thien, C.1
Lin, J.2
-
4
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
5
-
-
34249034303
-
Secret image hiding and sharing based on the (t, n)-threshold
-
Chang C.C., Lin C.Y., and Tseng C.S. Secret image hiding and sharing based on the (t, n)-threshold. Fundam. Inf. 76 4 (2007) 399-411
-
(2007)
Fundam. Inf.
, vol.76
, Issue.4
, pp. 399-411
-
-
Chang, C.C.1
Lin, C.Y.2
Tseng, C.S.3
-
6
-
-
0024141971
-
How to share a secret with cheaters
-
Tompa M., and Woll H. How to share a secret with cheaters. J. Cryptology 1 2 (1988) 133-138
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
7
-
-
0033115859
-
A concept of designing cheater identification methods for secret sharing
-
Hwang R.J., Lee W.B., and Chang C.C. A concept of designing cheater identification methods for secret sharing. J. Syst. Software 46 1 (1999) 7-11
-
(1999)
J. Syst. Software
, vol.46
, Issue.1
, pp. 7-11
-
-
Hwang, R.J.1
Lee, W.B.2
Chang, C.C.3
-
8
-
-
54349115361
-
-
R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.
-
R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.
-
-
-
-
9
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. J. Syst. Software 73 3 (2004) 405-414
-
(2004)
J. Syst. Software
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
10
-
-
34248584507
-
Improvements of image sharing with steganography and authentication
-
Yang C.N., Chen T.S., Yu K.H., and Wang C.C. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 7 (2007) 1070-1076
-
(2007)
J. Syst. Software
, vol.80
, Issue.7
, pp. 1070-1076
-
-
Yang, C.N.1
Chen, T.S.2
Yu, K.H.3
Wang, C.C.4
-
11
-
-
0036453480
-
-
S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.
-
S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.
-
-
-
-
12
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
13
-
-
33847647116
-
Cryptanalysis of an image encryption scheme
-
Li S., Li C., Lo K.T., and Chen G. Cryptanalysis of an image encryption scheme. J. Electron. Imaging 15 4 (2006) 043012-043113
-
(2006)
J. Electron. Imaging
, vol.15
, Issue.4
, pp. 043012-043113
-
-
Li, S.1
Li, C.2
Lo, K.T.3
Chen, G.4
-
14
-
-
39149100001
-
Cryptanalysis of a chaotic block cipher with external key and its improved version
-
Li C., Li S., Alvarez G., Chen G., and Lo K.T. Cryptanalysis of a chaotic block cipher with external key and its improved version. Chaos Solitons Fractals 37 7 (2008) 299-307
-
(2008)
Chaos Solitons Fractals
, vol.37
, Issue.7
, pp. 299-307
-
-
Li, C.1
Li, S.2
Alvarez, G.3
Chen, G.4
Lo, K.T.5
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 2 (1977) 120-126
-
(1977)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
18
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8 6 (1998) 1259-1284
-
(1998)
Int. J. Bifurcation Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
|