[1] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[2] |
PANG L J , WANG Y M . A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing[J]. Applied Mathematics & Computation, 2005,167(2): 840-848.
|
[3] |
荣辉桂, 莫进侠, 常炳国 ,等. 基于Shamir秘密共享的密钥分发与恢复算法[J]. 通信学报, 2015(3): 60-69.
|
|
RONG H G , MO J X , CHANG B G ,et al. Key distribution and recovery algorithm based on Shamir’s secret sharing[J]. Journal on Communications, 2015(3): 60-69.
|
[4] |
庞辽军, 王育民 . 基于RSA密码体制(f,n)门限秘密共享方案[J]. 通信学报, 2005,26(6): 70-73.
|
|
PANG L J , WANG Y M . (t,n) threshold secret sharing scheme based on RSA cryptosystem[J]. Journal of China Institute of Communications, 2005,26(6): 70-73.
|
[5] |
牛少彰, 钮心忻, 杨义先 . 基于Shamir秘密共享方案的数字水印算法[J]. 中国图象图形学报, 2003(10).
|
|
NIU S Z , NIU X X , YANG Y X . Digital watermarking algorithm based on shamir secret sharing scheme[J]. Journal of Image and Graphics, 2003(10).
|
[6] |
尚铭, 马原, 林璟锵 ,等. SM2椭圆曲线门限密码算法[J]. 密码学报, 2014,1(2): 155-166.
|
|
SHANG M , MA Y , JING J W ,et al. A threshold scheme for SM2 elliptic curve cryptographic algorithm[J]. Journal of Cryptologic Reseatch, 2014,1(2): 155-166.
|
[7] |
汪朝晖, 张振峰 . SM2 椭圆曲线公钥密码算法综述[J]. 信息安全研究, 2016,2(11): 972-982.
|
|
WANG C H , ZHANG Z F . Overview on public key cryptographic algorithm SM2 based on elliptic curves[J]. Information security research, 2016,2(11): 972-982.
|
[8] |
JAIN J , JOHARI P . Digital image watermarking based on LSB for gray scale image[J]. International Journal of Computer Science &Network Security, 2014.
|
[9] |
宋玉杰, 谭铁牛 . 基于脆弱性数字水印的图象完整性验证研究[J]. 中国图象图形学报, 2003,8(1): 1-7.
|
|
SONG Y J , TAN T N . A brief review on fragile watermarking based image authentication[J]. Journal of Image and Graphics, 2003,8(1): 1-7.
|
[10] |
胡东, 刘晓云 . 使用频域 LSB 水印算法的鲁棒性分析[J]. 电子科技大学学报, 2006,35(5): 770-773.
|
|
HU D , LIU X Y . Robust analysis for using LSB arithmetic to embed watermark in frequency domain[J]. Journal of University of Electronic Science and Technology of China, 2006,35(5): 770-773.
|
[11] |
陈波, 谭运猛, 吴世忠 . 信息隐藏技术综述[J]. 计算机与数字工程, 2005,33(2): 21-23.
|
|
CHEN B , TAN Y M , WU S Z . Research on information hiding techniques[J]. Computer & Digital Engineering, 2005,33(2): 21-23.
|
[12] |
DENG Y , KENNEY C , MOORE M S ,et al. Peer group filtering and perceptual color image quantization[C]// IEEE International Symposium on Circuits and Systems. 1999.
|