메뉴 건너뛰기




Volumn 2, Issue 1, 2011, Pages 78-90

Sharing a secret image in binary images with verification

Author keywords

Authentication; Torus automorphism; Visual cryptography; Watermarking

Indexed keywords

AUTOMORPHISMS; DIGITAL IMAGE; REAL-TIME APPLICATION; RECONSTRUCTED IMAGE; SECRET IMAGES; VISUAL CRYPTOGRAPHY; WATERMARK IMAGES;

EID: 84858735524     PISSN: 20734212     EISSN: 20734239     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (37)
  • 5
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes,Designs
    • D. R. Stinson, An explication of secret sharing schemes,Designs, Codes and Cryptography, vol. 2, pp. 35-390, 1992.
    • (1992) Codes and Cryptography , vol.2 , pp. 35-390
    • Stinson, D.R.1
  • 9
  • 10
    • 32844469722 scopus 로고    scopus 로고
    • Secret image sharing with smaller shadow images
    • R. Z. Wang, and C. H. Su, Secret image sharing with smaller shadow images, Pattern Recognition Letter, vol. 27, no. 6, pp. 551-555, 2006.
    • (2006) Pattern Recognition Letter , vol.27 , Issue.6 , pp. 551-555
    • Wang, R.Z.1    Su, C.H.2
  • 11
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Y. S. Wu, C. C. Thien, and J. C. Lin, Sharing and hiding secret images with size constraint, Pattern Recognition, vol. 37, no. 7, pp. 1377-1385, 2004.
    • (2004) Pattern Recognition , vol.37 , Issue.7 , pp. 1377-1385
    • Wu, Y.S.1    Thien, C.C.2    Lin, J.C.3
  • 12
    • 1642635190 scopus 로고    scopus 로고
    • A new (t, n) threshold image hiding scheme for sharing a secret color image
    • C. C. Chang, and I. C. Lin, A new (t, n) threshold image hiding scheme for sharing a secret color image, Proc. of ICCT, Beijing, China, vol. 1, pp. 196-202, 2003.
    • (2003) Proc. of ICCT, Beijing, China , vol.1 , pp. 196-202
    • Chang, C.C.1    Lin, I.C.2
  • 13
    • 14744284326 scopus 로고    scopus 로고
    • A new multi-secret images sharing scheme using Largrange's interpolation
    • J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, A new multi-secret images sharing scheme using Largrange's interpolation, Journal of Systems and Software, vol. 76, no. 3, pp. 327-339, 2005.
    • (2005) Journal of Systems and Software , vol.76 , Issue.3 , pp. 327-339
    • Feng, J.B.1    Wu, H.C.2    Tsai, C.S.3    Chu, Y.P.4
  • 14
    • 0037600743 scopus 로고    scopus 로고
    • Contrast-optimal k out of n secret sharing schemes in visual cryptography
    • T. Hofmeister, M. Krause, and H. U. Simon, Contrast-optimal k out of n secret sharing schemes in visual cryptography, Theoretical Computer Science, vol. 240, no. 2, pp. 471-485, 2000.
    • (2000) Theoretical Computer Science , vol.240 , Issue.2 , pp. 471-485
    • Hofmeister, T.1    Krause, M.2    Simon, H.U.3
  • 15
    • 0000437895 scopus 로고    scopus 로고
    • On the contrast in visual cryptography schemes
    • C. Blundo, A. De Santis and D. R. Stinson, On the contrast in visual cryptography schemes, Journal of Cryptology, vol. 12, no. 4, pp. 261-289, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 261-289
    • Blundo, C.1    de Santis, A.2    Stinson, D.R.3
  • 16
    • 0000793737 scopus 로고    scopus 로고
    • New colored visual secret sharing schemes
    • C. N. Yang, and C. S. Laih, New colored visual secret sharing schemes, Designs, Codes and Cryptography, vol. 20, no. 3, pp. 325-335, 2000.
    • (2000) Designs, Codes and Cryptography , vol.20 , Issue.3 , pp. 325-335
    • Yang, C.N.1    Laih, C.S.2
  • 19
    • 10044234541 scopus 로고    scopus 로고
    • Image size invariant visual cryptography
    • R. Ito, H. Kuwakado, and H. Tanaka, Image size invariant visual cryptography, IEICE Trans. Fundamentals, vol. E82-A, no. 10, pp. 2172-2177, 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.10 , pp. 2172-2177
    • Ito, R.1    Kuwakado, H.2    Tanaka, H.3
  • 21
    • 33847751502 scopus 로고    scopus 로고
    • Cheating prevention in visual cryptography
    • C. M. Hu, and W. G. Tzeng, Cheating prevention in visual cryptography, IEEE Trans. Image Processing, vol. 16, no. 1, pp. 36-45, 2007.
    • (2007) IEEE Trans. Image Processing , vol.16 , Issue.1 , pp. 36-45
    • Hu, C.M.1    Tzeng, W.G.2
  • 22
    • 34147183148 scopus 로고    scopus 로고
    • A cheating prevention scheme for binary visual cryptography with Homogeneous secret image
    • D. S. Tsai, T. H. Chen, and G. Horng, A cheating prevention scheme for binary visual cryptography with Homogeneous secret image,Pattern Recognition, vol. 40, no. 8, pp. 2356-2366, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2356-2366
    • Tsai, D.S.1    Chen, T.H.2    Horng, G.3
  • 25
    • 13644263677 scopus 로고    scopus 로고
    • Bit-level based secret sharing for image encryption
    • R. Lukac, and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, vol. 38, no. 5, pp. 767-772, 2005.
    • (2005) Pattern Recognition , vol.38 , Issue.5 , pp. 767-772
    • Lukac, R.1    Plataniotis, K.N.2
  • 27
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    • C. C. Chang, and J. C. Chang, An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letter, vol. 23, pp. 931-941, 2002.
    • (2002) Pattern Recognition Letter , vol.23 , pp. 931-941
    • Chang, C.C.1    Chang, J.C.2
  • 28
    • 34547689489 scopus 로고    scopus 로고
    • VCPSS: A two-in-one two decoding-options image sharing method combining visual cryptography and polynomial-style sharing (PSS) approaches
    • S. J. Lin, and J. C. Lin, VCPSS: A two-in-one two decoding-options image sharing method combining visual cryptography and polynomial-style sharing (PSS) approaches, Pattern Recognition, vol. 40, no. 12, pp. 3652-3666, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3652-3666
    • Lin, S.J.1    Lin, J.C.2
  • 30
    • 34249062353 scopus 로고    scopus 로고
    • Two secret sharing schemes based on boolean operations
    • D. Wang, L. Zhang, N. Ma, and X. Li, Two secret sharing schemes based on boolean operations, Pattern Recognition, vol. 40, pp. 2776-2785, 2007.
    • (2007) Pattern Recognition , vol.40 , pp. 2776-2785
    • Wang, D.1    Zhang, L.2    Ma, N.3    Li, X.4
  • 32
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • C. C. Lin, and W. H. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, 2004.
    • (2004) Journal of Systems and Software , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 33
    • 34248584507 scopus 로고    scopus 로고
    • Improvements of image sharing with steganography and authentication
    • C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, vol. 80, no. 7, pp. 1070-1076, 2007.
    • (2007) Journal of Systems and Software , vol.80 , Issue.7 , pp. 1070-1076
    • Yang, C.N.1    Chen, T.S.2    Yu, K.H.3    Wang, C.C.4
  • 34
    • 54349115361 scopus 로고    scopus 로고
    • A new image secret sharing scheme to identify cheaters
    • R. Zhao, J. J. Zhao, F. Dai, and F. Q. Zhao, A new image secret sharing scheme to identify cheaters,Computer Standards and Interfaces, vol. 31, no. 1, pp. 252-257, 2009.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 252-257
    • Zhao, R.1    Zhao, J.J.2    Dai, F.3    Zhao, F.Q.4
  • 35
    • 45549098627 scopus 로고    scopus 로고
    • Sharing secrets in stego images with authentication
    • C. C. Chang, Y. P. Hsieh, and C. H. Lin: Sharing secrets in stego images with authentication, Pattern Recognition, vol. 41, no. 10, pp. 3130-3137, 2008.
    • (2008) Pattern Recognition , vol.41 , Issue.10 , pp. 3130-3137
    • Chang, C.C.1    Hsieh, Y.P.2    Lin, C.H.3
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.