[1] |
肖迪,王莹,常燕廷,等.基于加法同态与多层差值直方图平移的密文图像可逆信息隐藏算法[J].信息网络安全,2016(4):9-16.
|
[2] |
熊金波, 马蓉, 张媛媛,等. 面向社交网络的图片信息隐藏方法与实现[J]. 信息网络安全, 2017(3):6-13.
|
[3] |
SHAMIR A.How to Share a Secret[J]. Communications of the Association for Computing Machinery, 1979, 22(11):612-613.
|
[4] |
BLAKLEY G R.Safeguarding Cryptographic Keys[C]//IEEE. Managing Requirements Knowledge, International Workshop on (1979),June 4-7, 1979,New York .New York: IEEE, 1979: 313-317.
|
[5] |
THIEN C C,LIN J C.Secret Image Sharing[J]. Computers & Graphics, 2002, 26(5):765-770.
|
[6] |
KANSO A, GHEBLEH M. Anefficient (t n)-threshold Secret Image Sharing Scheme[EB/OL]. , 2016-10-15.
|
[7] |
WANG R Z, SHYU S J.Scalable Secret Image Sharing[J]. Signal Processing Image Communication, 2007, 22(4):363-373.
|
[8] |
LIN Y Y, Wang R Z.Scalable Secret Image Sharing With Smaller Shadow Images[J]. IEEE Signal Processing Letters, 2010, 17(3):316-319.
|
[9] |
YANG C N,HUANG S M.Constructions and Properties of k out of n Scalable Secret Image Sharing[J].Optics Communications, 2010, 283(9):1750-1762.
|
[10] |
YANG C N, CHU Y Y.A General ( k, n ) Scalable Secret Image Sharing Scheme with the Smooth Scalability[J]. Journal of Systems & Software, 2011, 84(10):1726-1733.
|
[11] |
LIU Y X, YANG C N, YEH P H.Reducing Shadow Size in Smooth Scalable Secret Image Sharing[J]. Security & Communication Networks, 2014, 7(12):2237-2244.
|
[12] |
LEE J S, CHEN Y R.Selective Scalable Secret Image Sharing with Verification[J]. Multimedia Tools & Applications, 2017, 76(1):1-11.
|
[13] |
CHEN S K,LIN J C.Fault-tolerant and Progressive Transmission of Images[J]. Pattern Recognition, 2005, 38(12):2466-2471.
|
[14] |
LIU W,WANG A,CHANG C C, et al.A Grouped-scalable Secret Image Sharing Scheme[J]. Multimedia Tools & Applications, 2015, 74(17):7095-7109.
|
[15] |
欧阳显斌,邵利平,乐志芳. 非等量备份和双认证自修复有限域图像分存[J]. 软件学报,2017,28(12):3306-3346.
|