[1] Shamir A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613.
[2] Blakley G R.Safeguarding cryptographic keys[A].Proceedings of 1979 National Computer Conference[C].New York,USA:AFIPS,1979.48:313-317.
[3] Thien C C,Lin J C.Secret image sharing[J].Computers & Graphics,2002,26(5):765-770.
[4] Kanso A,Ghebleh M.An efficient(t,n)-threshold secret image sharing scheme[J].Multimedia Tools & Applications,2016,76(15):1-20.
[5] Lin C C,Tsai W H.Secret image sharing with steganography and authentication[J].Journal of Systems and Software,2004,73(3):405-414.
[6] Yang C N,Chen T S,Yu K H,et al.Improvements of image sharing with steganography and authentication[J].Journal of Systems and Software,2007,80(7):1070-1076.
[7] Chang C C,Hsieh Y P,Lin C H.Sharing secrets in stego images with authentication[J].Pattern Recognition,2008,41(10):3130-3137.
[8] Ulutas M,Ulutas G,Nabiyev V V.Secret image sharing with enhanced visual quality and authentication mechanism[J].The Imaging Science Journal,2011,59(3):154-165.
[9] 欧阳显斌,邵利平,陈文鑫.结合调整差值变换的(K,N)有意义图像分存方案[J].中国图象图形学报,2015,20(5):633-642. Ouyang Xianbin,Shao Liping,Chen Wenxin.Meaningful(K,N)image sharing scheme combined with the adjusting difference transformation[J].Journal of Image and Graphics,2015,20(5):633-642.(In Chinese)
[10] 欧阳显斌,邵利平.一种基于GF(23)的(K,N)有意义无扩张图像分存方案[J].计算机科学,2015,42(12):251-256. Ouyang Xianbin,Shao Liping.Meaningful(K,N)free expansion image sharing scheme based on GF(23)[J].Computer Science,2015,42(12):251-256.(in Chinese)
[11] Chang C C,Chen Y H,Wang H C.Meaningful secret sharing technique with authentication and remedy abilities[J].Information Sciences,2011,181(14):3073-3084.
[12] Chen Y H,Chang C C.Image tamper detection and recovery based on dual watermarks sharing strategy[J].Journal of Digital Information Management,2012,10(1):39-49.
[13] Wu X T,Sun W.Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform[J].Journal of Systems and Software,2013,86(4):1068-1088.
[14] 欧阳显斌,邵利平,乐志芳.非等量备份和双认证自修复有限域图像分存[J].软件学报,2017,28(12):3306-3346. Ouyang Xianbin,Shao Liping,Le Zhifang.Gloise field self-recovery image sharing scheme with non-equivalent backup and double authentications[J].Journal of Software,2017,28(12):3306-3346.(in Chinese)
[15] Chan C K,Cheng L M.Hiding data in images by simple LSB substitution[J].Pattern Recognition,2004,37(3):469-474.
[16] Li P,Yang C N,Wu C C,et al.Essential secret image sharing scheme with different importance of shadows[J].Journal of Visual Communication & Image Representation,2013,24(7):1106-1114.
[17] Yang C N,Li P,Wu C C,et al.Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach[J].Signal Processing Image Communication,2015,31:1-9.
[18] Li P,Yang C N,Zhou Z.Essential secret image sharing scheme with the same size of shadows[J].Digital Signal Processing,2016,50:51-60.
[19] 邵利平,覃征,衡星辰,等.基于矩阵变换的图像置乱逆问题求解[J].电子学报,2008,36(7):1355-1363. Shao Liping,Qin Zheng,Heng xingchen,et al.Solution for the inverse problem of matrix transform based image scrambling[J].Acta Electronica Sinica,2008,36(7):1355-1363.(in Chinese)
[20] 邵利平.数字图像置乱技术[M].北京:科学出版社,2016.56-94. |