References
- Shamir.A, “How to share a secret” Communication, ACM 22(11), 612–613, 1997. doi: 10.1145/359168.359176
- Blakley, G.R, “Safeguarding cryptographic keys” In: Proc. AFIPS National Computer Conf., vol 48, pp. 313–317, 1979.
- Naor, M., Shamir, A., “Visual cryptography, advances in cryptology” eurocrypt'94 Springer-Verlag Berlin. pp.1–12, 1995.
- Thien, C.C., Lin, J.C., “Secret image sharing”. Comput. Graphics 26 (1), 765–770,2002. doi: 10.1016/S0097-8493(02)00131-0
- Wang, Ran-Zan., Su, C.H., “Secret image sharing with smaller shadow images” Pattern Recognition Lett. 27(6), 551–555, 2006 doi: 10.1016/j.patrec.2005.09.021
- Wu, Y.S., Thien, C.C., Lin, J.C.,. “Sharing and hiding secret images with size constraint” Pattern Recognition 37 (7), 1377–1385, 2004. doi: 10.1016/j.patcog.2004.01.002
- Lin,C.C., Tsai, W H., “Secret image sharing with steganography and authentication”. J. Syst. Software 73(3), 405–414, 2004 doi: 10.1016/S0164-1212(03)00239-5
- Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., “Improvements of image sharing with steganography and authentication”. J. Syst. Software 80 (7), 1070–1076, 2007 doi: 10.1016/j.jss.2006.11.022
- Chang, C.C., Hsieh, Y.P., Lin, c. h., “Sharing secret in stego images with authentication” Pattern Recognition 41(10),3130–3137, 2008. doi: 10.1016/j.patcog.2008.04.006
- Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q., “A new image secret sharing scheme to identify cheaters”. Comput. Stand. Interface 31 (1), 252– 257, 2009 doi: 10.1016/j.csi.2007.10.012
- Lin, P.Y., Lee, J.S., Chang, C.C., “Distortion-free secret image sharing mechanism using modulus operator”. Pattern Recognition 42 (5), 886–895, 2009 doi: 10.1016/j.patcog.2008.09.014
- Pei-Y.u Lin, Chi-Shiang Chan “Invertible secret image sharing with steganography” Pattern Recognition Lett. 31 1887–1893, 2010. doi: 10.1016/j.patrec.2010.01.019
- Vora,V.S., Suthar,A.C.,” Analysis of Compressed Image Quality Assessments” International Journal of Advanced Engineering & Application, jan 2010.