Reference
|
-
[1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol. 18, No.4, 2009, 043011.
連結:
-
[2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol. 38, No. 12, 2005, pp. 2466–2471.
連結:
-
[3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol. 91, No. 1, 2011, pp. 90–97.
連結:
-
[4] W. P. Fang, “Friendly progressive visual secret sharing”, Pattern Recognition, Vol. 41, No. 4, 2008, pp. 1410–1414.
連結:
-
[5] P. J. V. Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011.
連結:
-
[6] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol. 33, No. 1, 2012, pp. 83–91.
連結:
-
[7] Y. C. Hou, Z. Y. Quan, C. F. Tsai, A. Y. Tseng, “Block-based progressive visual secret sharing”, Information Sciences, Vol. 233, No. 1, 2013, pp.290–304.
連結:
-
[8] Y. C. Hou and Z. Y. Quan “Progressive Visual Cryptography with Unexpanded Shares”, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 21, No. 11, 2011, pp.1760–1764.
連結:
-
[9] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 517–527.
連結:
-
[10] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol. 48, No. 4, 2008, 047006.
連結:
-
[11] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol. 21, No. 8, 2010, pp. 900–916.
連結:
-
[12] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199–210
連結:
-
[13] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp. 1332–1337.
連結:
-
[14] C. C. Thien and J. C. Lin, “Secret image sharing”, Computers & Graphics, Vol. 26, No. 5, 2002, pp. 765–770.
連結:
-
[15] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol. 86, No. 2, 2013, pp. 485–500.
連結:
-
[16] D. Wang, L. Zhang, N. Ma, X. Li, “Two secret sharing schemes based on Boolean operations”, Pattern Recognition, Vol. 40, No. 10, 2007, pp. 2776–2785.
連結:
-
[17] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol. 21, No. 7, 2010, pp. 751–761.
連結:
-
[18] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol. 85, No. 8, 2012, pp. 1852–1863.
連結:
-
[19] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, Vol. 285, No. 7, 2012, pp. 1725–1735.
連結:
|