[1] |
梁建武, 刘晓书, 程资 . 基于图态和中国剩余定理的量子秘密共享方案[J]. 通信学报, 2018,39(10): 72-78.
|
|
LIANG J W , LIU X S , CHEN Z . Quantum secret sharing with graph states based on Chinese remainder theorem[J]. Journal on Communications, 2018,39(10): 72-78.
|
[2] |
孙曦, 张卫明, 俞能海 . 基于空域图像变换参数扰动的隐写术[J]. 通信学报, 2017,38(10): 167-174.
|
|
SUN X , ZHANG W M , YU N H . Steganography based on parameters’ disturbance of spatial image transform[J]. Journal on Communications, 2017,38(10): 167-174.
|
[3] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[4] |
THIEN C C , LIN J C . Secret image sharing[J]. Computers and Graphics, 2002,26(5): 765-770.
|
[5] |
WANG R Z , SU C H . Secret image sharing with smaller shadow images[J]. Pattern Recognition Letters, 2006,27(6): 551-555.
|
[6] |
LIN C C , TSAI W H . Secret image sharing with steganography and authentication[J]. Journal of Systems and Software, 2004,73(3): 405-414.
|
[7] |
AMIR M A , MARYAM A . A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms[J]. Signal Processing:Image Communication, 2019,74(5): 78-88.
|
[8] |
JAMAL Z A , MOHAMMADEBRAHIM S A , ALIMOHAMMAD L . An adaptive secret image sharing with a new bitwise steganographic property[J]. Information Sciences, 2016,369(C): 467-480.
|
[9] |
YANG C N , CHEN T S , YU K H ,et al. Improvements of image sharing with steganography and authentication[J]. Journal of Systems and Software, 2007,80(7): 1070-1076.
|
[10] |
WU C C , KAO S J , HWANG M S . A high quality image sharing with steganography and adaptive authentication scheme[J]. Journal of Systems and Software, 2011,84(12): 2196-2207.
|
[11] |
ULUTAS M , ULUTAS G , NABIYEV V V . Secret image sharing with enhanced visual quality and authentication mechanism[J]. Journal of Photographic Science, 2011,59(3): 154-165.
|
[12] |
ESLAMI Z , AHMADABADI J Z . Secret image sharing with authentication-chaining and dynamic embedding[J]. Journal of Systems and Software, 2011,84(5): 803-809
|
[13] |
CHANG C C , CHEN Y H , WANG H C . Meaningful secret sharing technique with authentication and remedy abilities[J]. Information Sciences, 2011,181(14): 3073-3084.
|
[14] |
LIN P Y , LEE J S , CHANG C C . Distortion-free secret image sharing mechanism using modulus operator[J]. Pattern Recognition, 2009,42(5): 886-895.
|
[15] |
LIN P , CHAN C . Invertible secret image sharing with steganography[J]. Pattern Recognition Letter, 2011,31(13): 1887-1893.
|
[16] |
LIN Y Y , WANG R Z . Improved Invertible Secret Image Sharing with Steganography[C]// International Conference of Intelligent Information Hiding and Multimedia Signal Processing. 2011: 93-96.
|
[17] |
FENG B , YUAN Q Q , GUO C ,et al. Invertible proactive secret image sharing[J]. Journal of Chinese Computer Systems, 2015,36(3): 514-518.
|
[18] |
LIU Y , CHEN L , HU M ,et al. A reversible data hiding method for H.264 with Shami’s (t,n)-threshold secret sharing[J]. Neurocomputing, 2016,188(2): 63-70.
|
[19] |
MENG Q Q , YANG X Y , ZHONG W D ,et al. Implementation and optimization of S-box resisting DPA attacks based on secret sharing[J]. Netinfo Security, 2018,18(2): 71-77.
|
[20] |
CHENG Z , JIN L R , SHI J J . (k,n) Threshold quantum secret sharing scheme based on the generation of reed solomon code[J]. Netinfo Security, 2016,16(4): 44-49.
|
[21] |
KIEU T D , CHANG C C . A steganographic scheme by fully exploiting modification directions[J]. Expert Systems with Applications, 2011,38(8): 10648-10657.
|
[22] |
KUO W C , KAO M C . A steganographic scheme based on formula fully exploiting modification directions[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2013,E96-A(11): 2235-2243.
|
[23] |
KUO C W , LI J J , WANG C C ,et al. An improved data hiding scheme based on formula fully exploiting modification directions and pixel value differencing method[C]// The 11th Asia Joint Conference on Information Security. 2016: 136-140.
|