

Enhanced Image Secret Sharing Through Video Using Two Decoding Option
Abstract
Keywords
References
S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The computer Journal 49 (2006)
C. N. Yang, T. S. Chen, Extended visual secret sharing schemes: improving the shadow image quality, International Journal of Pattern Recognition and Artificial Intelligence 21 (2007) 879-898.
Chang-Chou Lin, Wen-Hsiang Tsai*, Secret image sharing with steganography and authentication (2003).
Ching-Nung Yang*, Chuei-Bang Ciou Ching-Nung Yang*, Image secret sharing method with two-decoding options: Lossless recovery and previewing capability (2009).
C-C Wua, M-S Hwang*b and S-J Kaoa, A new approach to the secret image sharing with steganography and authentication (2005)
Ching-Nung Yang and Tse-shih Chen, An image secret sharing scheme with the capability of previewing the secret image,(2001).
S.J.Lin, J.C.Lin, VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognition 40 (2007) 3652-3666.
M. Naor, A. Shamir, Visual Cryptography, Advances in Cryptology- EUROCRYPT‟20 LNCS 950 ,.(2000)
A. Shamir. How to share a secret, Communications of the Association for Computing Machinery 28 (2015) 612-613.
C. N. Yang, T. S. Chen, Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation, Pattern Recognition 39 (2006) 1300-1314.
Zhi- Hui-Wang, Huynh Ming-chu Li, Sharing a Secret Image in Binary Image with Verification- revised (2010).
Xinpeng-Zhang, Zhenxing-qian, Guorifeng, Effficient reversible data hiding in encrypted images -19 (2009).
DOI: http://dx.doi.org/10.36039/AA032014008
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.