Enhanced Image Secret Sharing Through Video Using Two Decoding Option
Abstract
Keywords
Full Text:
PDFReferences
S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The computer Journal 49 (2006)
C. N. Yang, T. S. Chen, Extended visual secret sharing schemes: improving the shadow image quality, International Journal of Pattern Recognition and Artificial Intelligence 21 (2007) 879-898.
Chang-Chou Lin, Wen-Hsiang Tsai*, Secret image sharing with steganography and authentication (2003).
Ching-Nung Yang*, Chuei-Bang Ciou Ching-Nung Yang*, Image secret sharing method with two-decoding options: Lossless recovery and previewing capability (2009).
C-C Wua, M-S Hwang*b and S-J Kaoa, A new approach to the secret image sharing with steganography and authentication (2005)
Ching-Nung Yang and Tse-shih Chen, An image secret sharing scheme with the capability of previewing the secret image,(2001).
S.J.Lin, J.C.Lin, VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognition 40 (2007) 3652-3666.
M. Naor, A. Shamir, Visual Cryptography, Advances in Cryptology- EUROCRYPT‟20 LNCS 950 ,.(2000)
A. Shamir. How to share a secret, Communications of the Association for Computing Machinery 28 (2015) 612-613.
C. N. Yang, T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognition 39 (2006) 1300-1314.
Zhi- Hui-Wang, Huynh Ming-chu Li, Sharing a Secret Image in Binary Image with Verification- revised (2010).
Xinpeng-Zhang, Zhenxing-qian, Guorifeng, Effficient reversible data hiding in encrypted images -19 (2009).
DOI: http://dx.doi.org/10.36039/AA032014008
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.