메뉴 건너뛰기




Volumn 42, Issue 5, 2009, Pages 886-895

Distortion-free secret image sharing mechanism using modulus operator

Author keywords

Cheater detection; Distortion free; Modulus operator; Rabin's signature; Secret sharing

Indexed keywords

CHEATER DETECTION; DISTORTION-FREE; MODULUS OPERATOR; RABIN'S SIGNATURE; SECRET SHARING;

EID: 58249139558     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.09.014     Document Type: Article
Times cited : (85)

References (18)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun. ACM 22 11 (1979) 612-613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 2
    • 0032204204 scopus 로고    scopus 로고
    • Sharing secret images using shadow codebooks
    • Chang C.C., and Hwang R.J. Sharing secret images using shadow codebooks. Inf. Sci. 111 1 (1998) 335-345
    • (1998) Inf. Sci. , vol.111 , Issue.1 , pp. 335-345
    • Chang, C.C.1    Hwang, R.J.2
  • 3
    • 0036794537 scopus 로고    scopus 로고
    • Secret image sharing
    • Thien C., and Lin J. Secret image sharing. Comput. Graphics 26 1 (2002) 765-770
    • (2002) Comput. Graphics , vol.26 , Issue.1 , pp. 765-770
    • Thien, C.1    Lin, J.2
  • 4
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
    • (2004) Pattern Recognition , vol.37 , Issue.7 , pp. 1377-1385
    • Wu, Y.S.1    Thien, C.C.2    Lin, J.C.3
  • 5
    • 34249034303 scopus 로고    scopus 로고
    • Secret image hiding and sharing based on the (t, n)-threshold
    • Chang C.C., Lin C.Y., and Tseng C.S. Secret image hiding and sharing based on the (t, n)-threshold. Fundam. Inf. 76 4 (2007) 399-411
    • (2007) Fundam. Inf. , vol.76 , Issue.4 , pp. 399-411
    • Chang, C.C.1    Lin, C.Y.2    Tseng, C.S.3
  • 6
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • Tompa M., and Woll H. How to share a secret with cheaters. J. Cryptology 1 2 (1988) 133-138
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 7
    • 0033115859 scopus 로고    scopus 로고
    • A concept of designing cheater identification methods for secret sharing
    • Hwang R.J., Lee W.B., and Chang C.C. A concept of designing cheater identification methods for secret sharing. J. Syst. Software 46 1 (1999) 7-11
    • (1999) J. Syst. Software , vol.46 , Issue.1 , pp. 7-11
    • Hwang, R.J.1    Lee, W.B.2    Chang, C.C.3
  • 8
    • 54349115361 scopus 로고    scopus 로고
    • R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.
    • R. Zhao, J.J. Zhao, F. Dai, F.Q. Zhao, A new image secret sharing scheme to identify cheaters, Computer Standards & Interfaces, doi:10.1016/j.csi.2007.10.012.
  • 9
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. J. Syst. Software 73 3 (2004) 405-414
    • (2004) J. Syst. Software , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 10
    • 34248584507 scopus 로고    scopus 로고
    • Improvements of image sharing with steganography and authentication
    • Yang C.N., Chen T.S., Yu K.H., and Wang C.C. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 7 (2007) 1070-1076
    • (2007) J. Syst. Software , vol.80 , Issue.7 , pp. 1070-1076
    • Yang, C.N.1    Chen, T.S.2    Yu, K.H.3    Wang, C.C.4
  • 11
    • 0036453480 scopus 로고    scopus 로고
    • S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.
    • S. Li, X. Zheng, On the security of an image encryption method, in: Proceedings of the 2002 IEEE International Conference on Image Processing, vol. 2, 2002, pp. 925-928.
  • 12
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
    • (2003) Pattern Recognition , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 13
    • 33847647116 scopus 로고    scopus 로고
    • Cryptanalysis of an image encryption scheme
    • Li S., Li C., Lo K.T., and Chen G. Cryptanalysis of an image encryption scheme. J. Electron. Imaging 15 4 (2006) 043012-043113
    • (2006) J. Electron. Imaging , vol.15 , Issue.4 , pp. 043012-043113
    • Li, S.1    Li, C.2    Lo, K.T.3    Chen, G.4
  • 14
    • 39149100001 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic block cipher with external key and its improved version
    • Li C., Li S., Alvarez G., Chen G., and Lo K.T. Cryptanalysis of a chaotic block cipher with external key and its improved version. Chaos Solitons Fractals 37 7 (2008) 299-307
    • (2008) Chaos Solitons Fractals , vol.37 , Issue.7 , pp. 299-307
    • Li, C.1    Li, S.2    Alvarez, G.3    Chen, G.4    Lo, K.T.5
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 2 (1977) 120-126
    • (1977) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 18
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8 6 (1998) 1259-1284
    • (1998) Int. J. Bifurcation Chaos , vol.8 , Issue.6 , pp. 1259-1284
    • Fridrich, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.