REFERENCES
- Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Process., 1999, 8, 58–68.
- Shamir, A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
- Naor, M. and Shamir, A. Visual cryptography. Lect. Notes Comp. Sci., 1995, 950, 1–12.
- Beimel, A. and Chor, B. Universally ideal secret sharing schemes. IEEE Trans. Inform. Theory, 1994, 40, 786–794.
- Stinson, D. R. Decomposition constructions for secret- sharing schemes. IEEE Trans. Inform. Theory, 1994, 40, 118–125.
- Beimel, A. and Chor, B. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory, 1998, 44, 1187–1896.
- Thien, C. C. and Lin, J. C. Secret image sharing. Comput. Graph. UK, 2002, 26, 765–770.
- Thien, C. C. and Lin, J. C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 1161–1169.
- Lin, C. C. and Tsai, W. H. Secret image sharing with steganography and authentication. J. Syst. Softw., 2004, 73, 405–414.
- Yang, C. N., Chen, T. S., Yu, K. H. and Wang, C. C. Improvements of image sharing with steganography and authentication. J. Syst. Softw., 2007, 80, 1070–1076.
- Kundur, D. and Hatzinakos, D. Proc. Int. IEEE, 1999, 87, 1167–1180.
- Wu, D. C. and Tsai, W. H. Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Patt. Recogn. Lett., 1999, 20, 1511–1517.
- Chan, C. K. and Cheng, L.-M. Hiding data in images by simple lsb substitution. Patt. Recogn., 2004, 37, 469–474.
- Wu, N. I. and Hwang, M. S. Data hiding: Current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
- Lin, E. T. and Delp, E. J. A review of fragile image watermarks, Proc. Int. Conf. on Multimedia and security workshop: ACM Multimedia ’99, Orlando, FL, USA, October 1999, ACM, Vol. 1, pp. 25–29.
- Feng, J. B., Lin I. C., Tsai, C. S. and Chu, Y. P. Reversible watermarking: Current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
- Stallings, W. Cryptography and network security: Principles and practice, 2003, 3rd edition, (Prentice Hall, Upper Saddle River, NJ).
- Wang, R. Z. and Su, C. H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2006, 27, 551–555.
- Weber, A. G. The USC-SIPI image database. Version 5. USC-SIPI report no. 315, University of Southern California, 1997.