Have a personal or library account? Click to login
Secret Image Sharing Scheme Based on a Boolean Operation Cover

Secret Image Sharing Scheme Based on a Boolean Operation

Open Access
|Jul 2014

References

  1. 1. Blakely, G. R. Safeguarding Cryptography Keys. - In: Proc. of AFIPS National Computer Conference, Vol. 48, 1979, 313-317.
  2. 2. Shamir, A. How to Share a Secret. - Communications of the ACM, Vol. 22, 1979, No 11, 612613.10.1145/359168.359176
  3. 3. Thien, C. C., J. C. Li n. Secret Image Sharing. - Computer Graphics, Vol. 26, 2002, No 5, 765770.10.1016/S0097-8493(02)00131-0
  4. 4. Thien, C. C., J. C. Lin. An Image-Sharing Method with User-Friendly Shadow Images. - IEEE Transactions on Circuit System, Vol. 13, 2003, No 12, 1161-1169.10.1109/TCSVT.2003.819176
  5. 5. Chang, C. C., I. C. Lin. A New (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image. - In: Proc. of ICCT'2003, Vol. 1, 2003, 196-202.
  6. 6. Wang, R. Z., C. H. Su. Secret Image Sharing with Smaller Shadow Images. - Pattern Recognition Letter, Vol. 27, 2006, No 6, 551-555.10.1016/j.patrec.2005.09.021
  7. 7. Wang, R. Z., S. J. Shyu. Scalable Secret Image Sharing. - Signal Processing: Image Communication, Vol. 22, 2007, No 4, 263-373.10.1016/j.image.2006.12.012
  8. 8. Lin, Y. Y., R. Z. Wang. Scalable Secret Image Sharing with Smaller Shadow Images. - IEEE Signal Processing Letters, Vol. 17, March 2010, No 3, 316-319.10.1109/LSP.2009.2038113
  9. 9. Naor, M., A. Shamir. Visual Cryptography. - In: Proc. of the Advances in Cryptology-Eurocrypt'94. Lecture Notes in Computer Science, Vol. 950, 1995, 1-12.10.1007/BFb0053419
  10. 10. Blundo, C., A. D. Santis, D. R. Stinson. On the Contrast in Visual Cryptography Schemes. - Journal of Cryptology, Vol. 12, 1999, No 4, 261-289.10.1007/s001459900057
  11. 11. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. - Pattern Recognition Letters, Vol. 25, 2004, No 4, 481-494.10.1016/j.patrec.2003.12.011
  12. 12. Yang, C. N., T. S. Chen. Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion. - Pattern Recognition Letters, Vol. 26, 2005, No 2, 193-206.10.1016/j.patrec.2004.08.025
  13. 13. Shyu, S. J., S. Y. Huang, Y. K. Lee, R. Z. Wang. Sharing Multiple Secrets in Visual Cryptography. - Pattern Recognition, Vol. 40, 2007, No 12, 3633-3651.10.1016/j.patcog.2007.03.012
  14. 14. Wang, D., L. Zhang, N. Ma, X. Li. Two Secret Sharing Schemes Based on Boolean Operations. - Pattern Recognition, Vol. 40, 2007, No 10, 2776-2785.10.1016/j.patcog.2006.11.018
  15. 15. Chen, T.-H., C.-S. Wu. Efficient Multi-Secret Image Sharing Based on Boolean Operations. -Journal of Signal Processing, Vol. 91, 2011, 90-97.10.1016/j.sigpro.2010.06.012
  16. 16. W u. A Secret Image Sharing Scheme for Light Images. - EURASIP Journal on Advances in Signal Processing, 2013.10.1186/1687-6180-2013-49
  17. 17. Chang, C-C., Chia-Chen Linc, T. Hoang Ngan Led, Hoai Bac Le. Sharing a Verifiable Secret Image Using Two Shadows. - Pattern Recognition, Vol. 42, November 2009, Issue 11, 3097-3114.10.1016/j.patcog.2009.04.012
  18. 18. Liu, H., X. Wang, A. K a d i r. Image Encryption Using DNA Complementary Rule and Chaotic Maps. - Applied Soft Computing, Vol. 12, 2012, 1457-1466.10.1016/j.asoc.2012.01.016
  19. 19. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyper-Chaotic Sequences. -Optics Communications, Vol. 285, 2012, No 1, 29-37.10.1016/j.optcom.2011.08.079
  20. 20. Wade, T., C. L. Washington. Introduction to Cryptography with Coding Theory. Pearson, August 2005.
DOI: https://doi.org/10.2478/cait-2014-0023 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 98 - 113
Published on: Jul 15, 2014
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2014 Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarka, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.