5
Views
0
CrossRef citations to date
0
Altmetric
Articles

Secret image sharing scheme based solely on ADDITION

Pages 183-188 | Published online: 18 Jul 2013

REFERENCES

  • Blakley, G. R. Safeguarding cryptographic keys, Proc. American Federation of Information Processing Societies Conf., Montvale, NJ, USA, 1979, 313–317.
  • Shamir, A. How to share a secret. Commun. ACM, 22, 1979, 612–613.
  • Chang, C. C., Tsai, C. S. and Chen, T. S. A new scheme for sharing secret color images in computer network. Int. Conf. on Parallel and Distributed Systems (ICPADS ’2000), Iwate, Japan, July 2000, 601–604.
  • Tso, R. A study on secret sharing schemes and their application to identity-based key agreement schemes. Phd thesis, Graduate School of Systems and Information Engineering, University of Tsukuba, Japan, March 2006.
  • Chang, C. C., and Hwang, R. J. Sharing secret images using shadow codebooks. Inform. Sci., 111, 1998, 335–345.
  • Thien, C. C. and Lin, J. C. Secret image sharing. Comput. Graph., 26, 2002, 765–770.
  • Lin, C. C. and Tsai, W. H. Secret multimedia information sharing with data hiding capacity by simple logic operations. Proc. 5th World Multi-conferences on Systemics, Cybernetics, and Informatics; and 7th Int. Conf. on Information Systems, analysis, and Synthesis, 1, Orlando, Florida, U.S.A., July 2001, 50–55.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.