References
- Shamir A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
- Blakley GR. Safeguarding cryptographic keys. Proc. Natl Comput. Conf., 1979, 48, 313–317.
- Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. Inf. Theory, 1983, 29, 208–210.
- Mignotte M. How to share a secret. Lect. Notes Comput. Sci., 1983, 149, 371–375.
- Thien C-C, Lin J-C. Secret image sharing. Comput. Graph., 2002, 26, 765–770.
- Wang R-Z, Su C-H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2006, 27, 551–555.
- Chang C-C, Lin C-C, Lin C-H, Chen Y-H. A novel secret image sharing scheme in color images using small shadow images. Inf. Sci., 2008, 178, 2433–2447.
- Zhao R, Zhao J-J, Dai F, Zhao F-Q. A new image secret sharing scheme to identify cheaters. Comput. Stand. Interf., 2009, 31, 252–257.
- Lin P-Y, Lee J-S, Chang C-C. ‘Distortion-free secret image sharing mechanism using modulus operator’, Patt. Recogn., 2009, 42, 886–895.
- Thien C-C, Lin J-C. An image sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol., 2003, 3, 1161–1169.
- Lin C-C, Tsai W-H. Secret image sharing with steganography and authentication. J. Syst. Software, 2004, 73, 405–414.
- Yang C-N, Chen T-S, Yu KH, Wang C-C. Improvements of image sharing with steganography and authentication. J. Syst. Software, 2007, 80, 1070–1076.
- Chang C-C, Hsieh Y-P, Lin C-H. Sharing secrets in stego images with authentication. Patt. Recogn., 2008, 41, 3130–3137.
- Wu C-C, Hwang M-S, Kao S-J. A new approach to the secret image sharing with steganography and authentication. Imag. Sci. J., 2009, 57, 140–151.
- Wu C-C, Kao S-J, Kuo W-C, Hwang M-S. Reversible secret image sharing based on Shamir’s scheme, Proc. Int. Conf. on Intelligent information hiding and multimedia signal processing: IIHMSP 2009, Kyoto, Japan, September 2009, IEEE, pp. 1014–1017.
- Chen C-C, Fu W-Y. A geometry based secret image sharing approach. J. Inf. Sci. Eng., 2008, 24, 1567–1577.
- Tso H-K. Sharing secret images using Blakley’s concept. Opt. Eng., 2008, 47, 077001.
- Ulutas M, Nabiyev V, Ulutas G. Improvements in geometry-based secret ımage sharing approach with steganography. Math. Probl. Eng., 2009, 2009, to be published.
- Chen C-C, Chang C-C. Secret image sharing using quadratic residues. Intell. Inf. Hiding Multimedia Signal Process., 2007, 1, 515–518.
- Meher PK, Patra JC. A new approach to secure distributed storage, sharing and dissemination of digital image, Proc. IEEE Int. Symp. on Circuits and systems: ISCAS 2006, Island of Kos, Greece, May 2006, IEEE, pp. 373–376.
- Shyu SJ, Chen Y. Threshold secret image sharing by Chinese remainder theorem, Proc. 3rd IEEE Asia-Pacific Services Computing Conf.: APSCC 2008, Yilan, Taiwan, December 2008, IEEE, pp. 1332–1337.
- Yang C-N, Ciou C-B. A comment on sharing secrets in stegoimages with authentication Patt. Recogn., 2009, 42, 1615–1619.