References
- Shamir, A. How to share a secret? Commun. ACM, 1979, 22, (11), 612–613. doi: 10.1145/359168.359176
- Blakley, G. R. Safeguarding cryptographic keys. Proceedings of ‘National Computer Conference’, Montvale, NJ, 1979, AFI-PS Press, vol. 48, pp. 313–317.
- Asmuth, C., and Bloom, J. A modular approach to key safeguarding. IEEE Trans. Inform. Theory, 1983, 29, (2), 208–210. doi: 10.1109/TIT.1983.1056651
- Thien, C.-C., Lin, J.-C. Secret image sharing. Comput. Graph., 2002, 26, (5), 765–770. doi: 10.1016/S0097-8493(02)00131-0
- Kaya, K. and Selçuk, A. A. Threshold cryptography based on Asmuth-Bloom secret sharing. Inform. Sci., 2007, 177, (19), 4148–4160. doi: 10.1016/j.ins.2007.04.008
- Wang, D., Zhang, L., Ma, N. and Li, X. Two secret sharing schemes based on Boolean operations. Pattern Recogn., 2007, 40, (10), 2776–2785. doi: 10.1016/j.patcog.2006.11.018
- Dong, L. and Ku, M. Novel (n, n) secret image sharing scheme based on addition. Sixth International Conference on ‘Intelligent Information Hiding and Multimedia Signal Processing’, 2010, pp. 583–586.
- Nag, A., Singh, J. P., Sarkar, D., Sarkar, P. P. and Biswas, S. Distortion free secret image sharing based on X-OR operation. International Conference on ‘Communications, Devices and Intelligent Systems (CODIS)’, IEEE, 2012, pp. 286–289.
- Naskar, P. K., Chaudhuri, A., Basu, D. and Chaudhuri, A. A novel image secret sharing scheme. International Conference on ‘Emerging Applications of Information Technology’, IEEE, 2011, pp. 177–180.
- Naskar, P. K., Khan, H. N., Roy, U., Chaudhuri, A. and Chaudhuri, A. Shared cryptography with embedded session key for secret audio. Int. J. Comput. Appl., 2011, 26, (8), 5–9.
- Naskar, P. K., Khan, H. N., Roy, U., Chaudhuri, A. and Chaudhuri, A. Secret image sharing with embedded session key. Int. Conf. CISIM 2011, 2011, 245, 286–294.
- Jakhar, J., Dey, P., Dutta, M. and Bhattacharyya, D. K. CellTCS:A Secure threshold cryptography scheme based on non-linear hybrid cellular automata. Procedia Technol. 2012, 6, 947–953. doi: 10.1016/j.protcy.2012.10.115
- Nandakumar, A., Amritha, P. P., Lakshmy, K. V. and Talluri, V. S. Nonlinear secret sharing for gray scale images. Procedia Eng., 2012, 30, 945–952. doi: 10.1016/j.proeng.2012.01.949
- Wu, K.-S. A secret image sharing scheme for light images. EURASIP J. Adv. Signal Process., 2013, 49, 1–5.
- Chen, C.-C. and Fu, W.-Y. A geometry based secret image sharing approach. J. Inform. Sci. Eng., 2008, 24, (5), 1567–1577.
- Ulutas, G., Ulutas, M. and Nabiyev, V. Distortion free geometry base secret image sharing. WCIT-2010, Proc. Comput. Sci., 2011, 3, 721–726.
- Wu, C.-C., Hwang, M.-S. and Kao, S.-J. A new approach to the secret image sharing with steganography and authentication. Imag. Sci. J., 2009, 57, (3), 140–151. doi: 10.1179/174313109X459887
- Wu, C.-C., Kao, S.-J. and Hwang, M.-S. A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw., 2011, 84, (12), 2196–2207. doi: 10.1016/j.jss.2011.06.021
- Chang, C.-C., Hsieh, Y.-P. and Lin, C.-H. Sharing secrets in Stego images with authentication. Pattern Recogn., 2008, 41, (10), 3130–3137. doi: 10.1016/j.patcog.2008.04.006
- Shin, S.-H., Lee, G.-J. and Yoo, K.-Y. Nonlinear secret image sharing scheme. Scientific World J., 2014, 2014, 1–7.
- Feng, J.-B., Wu, H.-C., Tsai, C.-S. and Chu, Y.-P. A new multi secret image sharing scheme using Lagrange’s interpolation. J. Syst. Softw. 2005, 76, (3), 327–339. doi: 10.1016/j.jss.2004.07.250
- Askari, N., Moloney, C. and Heys, H. M. A novel visual secret sharing scheme without image size expansion. IEEE Canadian Conference on ‘Electrical and Computer Engineering (CCECE)’, 2012, pp. 1–4.
- Salehi, S. and Balafar, M. A. Visual multi secret sharing by cylindrical random grid. J. Inform. Security Appl., 2014, 19, (3), 245–255. doi: 10.1016/j.jisa.2014.05.003
- Jiao, S. and Goutte, R. Code for encryption hiding data into genomic DNA of living organisms. Proceedings of the ‘9th International Conference on Signal Processing (ICSP’08)’, China, 2008, pp. 2166–2169.
- Enayatifar, R., Abdullah, A. H. and Isnin, I. F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics Lasers Eng., 2014, 56, 83–93. doi: 10.1016/j.optlaseng.2013.12.003
- Pareek, N. K., Patidar, V. and Sud, K. K. Image encryption using chaotic logistic map. Image Vision Comput., 2006, 24, (9), 926–934. doi: 10.1016/j.imavis.2006.02.021
- Kanso, A., Smaoui, N. Logistic chaotic maps for binary numbers generations. Chaos Solitons Fractals, 2009, 40, (5), 2557–2568. doi: 10.1016/j.chaos.2007.10.049
- Naskar, P. K. and Chaudhuri, A. A robust image encryption technique using dual chaotic map. Int. J. Electronic Security Digital Forensics, 2015, 7, (4), 358–380. doi: 10.1504/IJESDF.2015.072180