References
- Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proc. AFIPS National Computer Conf., vol. 48, pp. 313-317.
- Shamir, A., 1979. How to share a secret. Comm. ACM 22 (11), 612-613. https://doi.org/10.1145/359168.359176
- Naor, M., Shamir, A., 1995. Visual Cryptography. Advances in Cryptology: Eurocrypt'94. Spring-Verlag, Berlin. pp. 1-12.
- Chen, T.H., Tsao, K.H., 2009. Visual secret sharing by random grids revisited. Pattern Recognition 42 (9), 2203-2217. https://doi.org/10.1016/j.patcog.2008.11.015
- Shamir, A., Naor, M., 1996. Visual cryptography II: Improving the contrast via the cover base. Security Comm. Networks, 16-17.
- Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. J. Syst. Software 73 (3), 405-414. https://doi.org/10.1016/S0164-1212(03)00239-5
- Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., 2007. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 (7), 1070-1076. https://doi.org/10.1016/j.jss.2006.11.022
- Beimel, A., Chor, B., 1998. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory 44 (5), 1887-1896. https://doi.org/10.1109/TIT.1998.705566
- Park, Y. B., Park, J. I., 2002. A Study on the Cipher JPEG Img, Journal of the Korea Academia-Industrial cooperation Society, vol.3, no.4, pp.308-312, 2002.
- Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H., 2008. A novel secret image sharing scheme in color images using small shadow images. Inform. Sci. 178 (11), 2433-2447. https://doi.org/10.1016/j.ins.2007.12.016
- Chang, C.C., Hsieh, Y.P., Lin, C.H., 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41 (10), 3130-3137. https://doi.org/10.1016/j.patcog.2008.04.006
- Lin, P.Y., Lee, J.S., Chang, C.C., 2009. Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42 (5), 886-895. https://doi.org/10.1016/j.patcog.2008.09.014
- Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1), 765-770. https://doi.org/10.1016/S0097-8493(02)00131-0
- Wang, R.Z., Su, C.H., 2006. Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27 (6), 551-555. https://doi.org/10.1016/j.patrec.2005.09.021
- Wang, D., Zhang, L., Ma, N., Li, X., 2007. Two secret sharing schemes based on Boolean operations. Pattern Recognition 40 (10), 2776-2785. https://doi.org/10.1016/j.patcog.2006.11.018
- Kim, C., 2013. (2, 2) Secret Sharing Using Data Hiding and Multiplexer Technique, The Journal of The Institute of Internet, Broadcasting and Communication, vol.13, no.4, pp.75-81. https://doi.org/10.7236/JIIBC.2013.13.4.75
- Wu, Y.S., Thien, C.C., Lin, J.C., 2004. Sharing and hiding secret images with size constraint. Pattern Recognition 37 (7), 1377-1385. https://doi.org/10.1016/j.patcog.2004.01.002
- Kim, C., 2014. Data hiding by an improved exploiting modification direction, Multimedia Tools and Applications, vol.69, no.3, pp 569-584. https://doi.org/10.1007/s11042-012-1114-0