共 27 条
[1]
Blakley G.R., Safeguarding cryptographic keys, Proceedings of Afips National Computer Conference, 48, pp. 313-317, (1979)
[2]
Shamir A., How to share a secret, Communications of The ACM, 22, 11, pp. 612-613, (1979)
[3]
Chang C.C., Hwang R.J., Efficient cheater identification method for threshold schemes, Iee Proceedings - Computers and Digital Techniques, 144, 1, pp. 23-27, (1997)
[4]
Beimel A., Chor B., Secret sharing with public reconstruction, Ieee Transactions On Information Theory, 44, 5, pp. 1887-1896, (1998)
[5]
Chang C.C., Hwang R.J., Sharing secret images using shadow codebooks, Information Sciences, 111, 1, pp. 335-345, (1998)
[6]
Chen T.S., Chang C.C., New method of secret image sharing based on vector quantization, Journal of Electronic Imaging, 10, 4, pp. 988-997, (2001)
[7]
Feng J.B., Wu H.C., Tsai C.S., Chu Y.P., A new multi-secret images sharing scheme using Lagrange's Interpolation, The Journal of Systems and Software, 76, 3, pp. 327-339, (2005)
[8]
Chang C.C., Lin C.Y., Tseng C.S., Secret image hiding and sharing based on the (t, n)-threshold, Fundamenta Informaticae, 76, 4, pp. 399-411, (2007)
[9]
Thien C.C., Lin J.C., Secret image sharing, Computer & Graphics, 26, 1, pp. 765-770, (2002)
[10]
Wang R.Z., Shyu S.J., Scalable secret image sharing, Signal Processing: Image Communication, 22, 4, pp. 363-373, (2007)