Computer Science ›› 2019, Vol. 46 ›› Issue (4): 123-128.doi: 10.11896/j.issn.1002-137X.2019.04.020
• Information Security • Previous Articles Next Articles
YUAN Xi-xi, CAI Zhan-chuan
CLC Number:
[1]OUYANG X B,SHAO L P.A (K,N) Significant Nonexpansive Image Sharing Scheme Based on GF (23)[J].Computer Science,2015,42(12):251-256.(in Chinese) 欧阳显斌,邵利平.一种基于 GF (23) 的(K,N)有意义无扩张图像分存方案[J].计算机科学,2015,42(12):251-256. [2]HU C Q,DENG S J,QIN M F,et al.Digital image encryption algorithm based on Logistic and standard mapping[J].Computer Science,2010,37(12):57-59.(in Chinese) 胡春强,邓绍江,秦明甫,等.基于 Logistic 与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. [3]SUN W,ZHOU J,ZHU S,et al.Robust Privacy-Preserving Ima- ge Sharing over Online Social Networks (OSNs)[J].ACM Transactions on Multimedia Computing,Communications,and Applications (TOMM),2018,14(1):14. [4]ROZANTSEV A,SALZMANN M,FUA P.Beyond sharing weights for deep domain adaptation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,41(4):801-814. [5]SASAKI M,WATANABE Y.Visual Secret Sharing Schemes Encrypting Multiple Images[J].IEEE Transactions on Information Forensics and Security,2018,13(2):356-365. [6]HU C Q.Research and Implementation of Image Secret Sharing Algorithm[D].Chongqing:Chongqing University,2009.(in Chinese) 胡春强.图像分存算法的研究与实现[D].重庆:重庆大学,2009. [7]YI F,WANG D S,DAI Y Q.Multi-secure color image visual sharing scheme for general access structure[J].Progress inNa-tural Science,2006,16(1):95-100.(in Chinese) 易枫,王道顺,戴一奇.一般存取结构的多密图彩色可视分存方案[J].自然科学进展,2006,16(1):95-100. [8]YI F,WANG D S,LUO P,et al.Two new color image (n,n) sharing schemes[J].Journal of Communications,2007,28(5):30-35.(in Chinese) 易枫,王道顺,罗平,等.两种新的彩色图像 (n,n) 分存方案[J].通信学报,2007,28(5):30-35. [9]DENG S J,HU C Q,WANG F X,et al.Digital Image Sharing Algorithm Based on Quadratic Remainder Theorem[J].Computer Engineering,2009,35(15):124-125.(in Chinese) 邓绍江,胡春强,王方晓,等.基于二次剩余定理的数字图像分存算法[J].计算机工程,2009,35(15):124-125. [10]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. [11]BLAKLEY G R,KABATIANSKII G A.Linear algebra ap- proach to secret sharing schemes[M]∥Error Control,Crypto-logy,and Speech Compression.Springer,Berlin,Heidelberg,1994:33-40. [12]LIU S,WANG D S.(k,n) Visual Extension of True Color Extension[J].Journal of Wuhan University(Natural Science Edition),2008,54(5):603-606.(in Chinese) 刘硕,王道顺.(k,n) 真彩色扩展可视分存技术[J].武汉大学学报 (理学版),2008,54(5):603-606. [13]NAOR M,SHAMIR A.Visual cryptography[C]∥Workshop on the Theory and Application of of Cryptographic Techniques.Springer,Berlin,Heidelberg,1994:1-12. [14]WANG D S,ZHANG L,MA N,et al.Two secret sharing schemes based on Boolean operations[J].Pattern Recognition,2007,40(10):2776-2785. [15]LEE K H,CHIU P L.Sharing visual secrets in single image random dot stereograms[J].IEEE Transactions on image proces-sing,2014,23(10):4336-4347. [16]DANG W,HE M,WANG D,et al.K out of K Extended Visual Cryptography Scheme Based on “XOR”[J].International Journal of Computer and Communication Engineering,2015,4(6):439. [17]KATZ J,MENEZES A J,VANOORSCHOT P C,et al.Hand- book of applied cryptography[M].CRC Press,1996:64-69. [18]DHAMIJA R,PERRIG A.Deja Vu-A User Study:Using Images for Authentication[C]∥USENIX Security Symposium.2000:4. [19]THIEN C C,LIN J C.Secret image sharing.Computers & Graphics,2002,26(5):765-770. [20]SINGH P,RAMAN B.Reversible data hiding based on Shamir’s secret sharing for color images over cloud[J].Information Sciences,2018,422:77-97. [21]YAN X,LIU X,YANG C N.An enhanced threshold visual secret sharing based on random grids[J].Journal of Real-time Ima-ge Processing,2018,14(1):61-73. [22]HUA W,LIAO X.A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem[J].Multimedia Tools and Applications,2017,76(5):7087-7103. [23]BAO L,YI S,ZHOU Y.Combination of Sharing Matrix and Ima- ge Encryption for Lossless (k,n)-Secret Image Sharing[J].IEEE Transactions on Image Processing,2017,26(12):5618-5631. [24]MATSUMOTO R.Quantum stabilizer codes can realize access structures impossible by classical secret sharing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2017,100(12):2738-2739. [25]齐东旭,宋瑞霞,李坚.非连续正交函数[M].北京:科学出版社,2011:280-281. [26]YU J D,SONG R X,QI D X.A scheme for steganography based on triangular partition of digital images [J].Journal of Compu-ter Research and Development,2009,46(9):1432-1437.(in Chinese) 余建德,宋瑞霞,齐东旭.基于数字图像三角形剖分的信息伪装算法[J].计算机研究与发展,2009,46(9):1432-1437. [27]U K T,JI N,QI D X,et al.A novel image denoising algorithm based on non-uniform triangular partition and interpolation[C]∥2010 International Conference on Future Power and Energy Engineering (ICFPEE).IEEE,2010:67-70. [28]CAI Z,LAN T.Method for coding data:U.S.Patent 9,755,661[P].2017-09-05. [29]SHARMA V K,SRIVASTAVA D K,MATHUR P.Efficient image steganography using graph signal processing[J].IET Image Processing,2018,12(6):1065-1071. [30]MUHAMMAD K,HAMZA R,AHMAD J,et al.Secure Surveillance Framework for IoT systems using Probabilistic Image Encryption[J].IEEE Transactions on Industrial Informatics,2018,14(8):3679-3689. [31]TOMPA M,WOLL H.How to share a secret with cheaters[M]∥ Advances in Cryptology-CRYPTO’ 86.Springer Berlin Heidelberg,1987:261-265. |
[1] | OUYANG Xian-bin and SHAO Li-ping. Meaningful (K,N) Free Expansion Image Sharing Scheme Based on GF(23) [J]. Computer Science, 2015, 42(12): 251-256. |
[2] | . Secret Gray-level Image Sharing Scheme Based on Recovery Function and Error Diffusion [J]. Computer Science, 2013, 40(2): 112-116. |
[3] | ZHANG Yu-chen,WANG Ya-di,HAN Ji-hong,FAN Yu-dan. Distributed Key Management for Ad-hoc Network Based on CPK [J]. Computer Science, 2011, 38(10): 75-77. |
[4] | BU Shan-yue,WANG Ru-chuan. Verifiable and Efficient Multi-secret Sharing Threshold Scheme [J]. Computer Science, 2011, 38(1): 100-103. |
[5] | BA0 Yang,LU Zheng-ding,HUANG Bao-hua,LI Rui-xuan,HU He-ping,LU Song-feng. Dynamic Multi-secret Sharing Scheme for P2P Environment [J]. Computer Science, 2010, 37(9): 40-43. |
[6] | LIU Yi,HAO Yan-jun,PANG Liao-jun. Verifiable Secret Sharing Scheme Based on ElGamal Cryptosystem [J]. Computer Science, 2010, 37(8): 80-82. |
[7] | CHEN Yang-kui,YU Jia,HAO Rong,LIU Hong-yan,XU Yue-bin. Publicly Verifiable Secret Sharing Scheme with Proactive Ability [J]. Computer Science, 2010, 37(6): 125-127. |
[8] | YAN De-qin ZHAO Hong-bo JIN Hong (Department of Computer Seienee,Liaoning Normal University,Dalian 116029,China). [J]. Computer Science, 2009, 36(6): 75-77. |
[9] | . [J]. Computer Science, 2006, 33(8): 126-127. |
[10] | WU Kai-Gui ,LIU Dong ,FENG Yong (College of Computer, Chongqing University, Chongqing 400044). [J]. Computer Science, 2006, 33(3): 97-98. |
[11] | PANG LiaoJun, WANG Yu-Min (National Key Lab. of Integrated Service Networks, Xidian Univ, , Xi'an 710071). [J]. Computer Science, 2006, 33(1): 66-68. |
|