Computer Science ›› 2015, Vol. 42 ›› Issue (12): 251-256.
Previous Articles Next Articles
OUYANG Xian-bin and SHAO Li-ping
[1] Shamir A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613 [2] Blakley G R.Safeguarding cryptographic keys[C]∥Proceedings of 1979 National Computer Conference.New York,USA:AFIPS,1979:313-317 [3] Thien C C,Lin J C.Secret image sharing[J].Computers &Graphics,2002,26(5):765-770 [4] Chen C C,Fu W Y.A Geometry-based secret image sharing approach [J].Journal of Information Science and Engineering,2008,24(5):1567-1577 [5] Tso H K.Sharing secret images using Blakley’s concept[J].Optical Engineering.2008,47(7):0770011-0770013 [6] 吴小天,孙伟.基于误差扩散的图像分存方案[J].计算机应用,2011,31(1):74-77 Wu Xiao-tian,Sun Wei.Image sharing scheme based on error diffusion[J].Journal of Computer Applications,2011,1(1):74-77 [7] 欧锻灏,吴小天,孙伟,等.基于恢复函数和误差扩散的灰度图像分存方案[J].计算机科学,2013,40(2):112-116 Ou Duan-hao,Wu Xiao-tian,Sun Wei,et al.Secret gray-level image sharing scheme based on recovery function and error diffusion[J].Computer Science,2013,40(2):112-116 [8] Lin C C,Tsai W H.Secret image sharing with steganography and authentication[J].The Journal of Systems and Software,2004,73(3):405-414 [9] Yang C N,Chen T S,Yu K H,et al.Improvements of image sharing with steganography and authentication[J].The Journal of Systems and Software,2007,80(7):1070-1076 [10] Chang C C,Hsieh Y P,Lin C H.Sharing secrets in stego images with authentication[J].Pattern Recognition,2008,41(10):3130-3137 [11] Chang C C,Chen Y H,Wang H C.Meaningful secret sharing technique with authentication and remedy abilities[J].Information Sciences,2011,1(14):3073-3084 [12] Chen Y H,Chang C C.Image tamper detection and recovery based on dual watermarks sharing strategy[J].Journal of Digi-tal Information Management,2012,10(1):39-49 [13] Yang C N,Ouyang J F,Harn L.Steganography and authentication in image sharing without parity bits[J].Optics Communications,2012,285(7):1725-1735 |
No related articles found! |
|