16
Views
8
CrossRef citations to date
0
Altmetric
Articles

Hiding a secret colour image in two colour images

Pages 229-240 | Published online: 18 Jul 2013

References

  • Pfitzmann, B. Information hiding terminology. Proc. 1st Int. Workshop Information Hiding, June 1996, pp. 347–350.
  • Naor, M. and Shamir, A. Visual cryptography. In Eurocrypt’94, Lecture Notes in Computer Science, 1994, pp. 1–12 (Springer, Perugia, Italy).
  • Lee, Y.-C. and Laih, C.-S. A V-fairness (tin) secret sharing scheme. IEE Proc. Comput. Digital Technol., 1997, 245–248.
  • Lin, H.-Y. and Harn, L. A generalized secret sharing scheme with cheater detection. Advances in Cryptology-Asiacrypt’91, 1991, pp. 149–158 (Springer, Berlin, Heidelberg).
  • Verheul, E. R. and Tilborg, H. C. A. Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr., 1997, 11, 179–196.
  • Chang, C.-C., Tsai, C.-S. and Chen, T.-S. A technique for sharing a secret color image. Proc. 9th National Conf. Information Security, Taichung, May 1999, LXIII–LXXII.
  • Hou, Y.-C., Li, F. and Chang, C.-Y. A new approach on 256 color secret image sharing technique. MIS Review, December, No. 9 1999, 89–105.
  • Hou, Y.-C., Li, F. and Chang, C.-Y. Improvement and implementation of the secret color image sharing technique. Proc. 5th Conf. Information Management, Taipei, November 1999, pp. 592–597.
  • Hou, Y.-C., Chang, C.-Y. and Lin, F. Visual cryptography for color images based on color decomposition. Proc. 5th Conf. Information Management, Taipei, November 1999, pp. 584–591.
  • Hou, Y.-C. Visual cryptography for color images. Pattern Recognition, 2003, 36, 1619–1629.
  • Hwang, R.-J. and Chang, C.-C. Hiding a picture in two pictures. Opt. Eng., 2001, 40, 342–351.
  • Floyd, R. W. and Steinberg, L. An adaptive algorithm for spatial grayscale. Proc. Soc. Inf. Display,1976, 17(2), 75–77.
  • Poynton, C. A. Frequently asked questions about color. Available at http://www.inforamp.net/~poynton.
  • Chang, C.-C. and Hwang, R.-J. A simple picture hiding scheme. Comput. Process. Oriental Lang., 1998, 12, 237–248.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.