Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
Elsevier DOI
0402
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel
expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
Elsevier DOI
0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images
Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI
0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square
Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI
0509
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing
schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
Elsevier DOI
0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered
Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI
0610
Visual secret sharing; Visual cryptography; Secret image sharing
BibRef
Wang, R.Z.[Ran-Zan],
Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI
0604
BibRef
Wang, R.Z.[Ran-Zan],
Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
Elsevier DOI Secret sharing; Image sharing; Shadow image; Data hiding
0604
BibRef
Lin, Y.Y.[Yung-Yi],
Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI
1001
BibRef
Wang, R.Z.[Ran-Zan],
Chien, Y.F.[Yin-Fang],
Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI
1003
Image sharing; Secret sharing; Secret image sharing; User-friendly
shadow image; Progressive reconstruction; Scalable sharing; Visual
cryptography; Visual secret sharing
BibRef
Thien, C.C.[Chih-Ching],
Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data
in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
Elsevier DOI
0310
BibRef
Thien, C.C.[Chih-Ching],
Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract.
0402
BibRef
Li, P.[Peng],
Ma, J.F.[Jian-Feng],
Ma, Q.[Quan],
(t, k, n) XOR-based visual cryptography scheme with essential shadows,
JVCIR(72), 2020, pp. 102911.
Elsevier DOI
2010
XOR operation, Essential participants, Visual cryptography, Secret image sharing
BibRef
Li, P.[Peng],
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Kong, Q.[Qian],
Ma, Y.P.[Yan-Peng],
Essential secret image sharing scheme with different importance of
shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI
1309
Secret sharing
BibRef
Li, P.[Peng],
Liu, Z.Q.[Zu-Quan],
Yang, C.N.[Ching-Nung],
A construction method of (t,k,n)-essential secret image sharing
scheme,
SP:IC(65), 2018, pp. 210-220.
Elsevier DOI
1805
BibRef
Earlier: A1, A2, Only:
A Novel Visual Cryptography Scheme with Different Importance of Shadows,
IWDW17(365-377).
Springer DOI
1708
Secret image sharing, Secret sharing, Essential shadows,
Lagrange interpolation.
BibRef
Li, P.[Peng],
Yin, L.P.[Li-Ping],
Ma, J.F.[Jian-Feng],
Wang, H.T.[Hong-Tao],
XOR-based visual cryptography scheme with essential shadows,
JVCIR(85), 2022, pp. 103513.
Elsevier DOI
2205
XOR operation, Essential shadows, Visual cryptography,
Secret image sharing, Shadow image, Access structure partition
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Scalable secret image sharing scheme with essential shadows,
SP:IC(58), No. 1, 2017, pp. 49-55.
Elsevier DOI
1710
Secret image sharing
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Chou, Y.S.[Yung-Shun],
Wu, S.Y.[Song-Yu],
Sun, Q.D.[Qin-Dong],
Progressive (k,n) secret image sharing Scheme with meaningful shadow
images by GEMD and RGEMD,
JVCIR(55), 2018, pp. 766-777.
Elsevier DOI
1809
Progressive secret sharing scheme, Meaningful shadow image,
GEMD, RGEMD
BibRef
Yang, C.N.[Ching-Nung],
Li, P.[Peng],
Wu, C.C.[Chih-Cheng],
Cai, S.R.[Song-Ruei],
Reducing shadow size in essential secret image sharing by conjunctive
hierarchical approach,
SP:IC(31), No. 1, 2015, pp. 1-9.
Elsevier DOI
1502
Secret sharing
BibRef
Srividhya, S.,
Sathishkumar, R.,
Sudha, G.F.[Gnanou Florence],
Implementation of TiOISSS with meaningful shadows and with an
additional authentication image,
JVCIR(38), No. 1, 2016, pp. 284-296.
Elsevier DOI
1605
Two in One Image Secret Sharing Scheme.
Visual cryptography
BibRef
Yan, X.H.[Xue-Hu],
Gong, Q.H.[Qing-Hong],
Li, L.L.[Long-Long],
Yang, G.Z.[Guo-Zheng],
Lu, Y.L.[Yu-Liang],
Liu, J.J.[Jing-Ju],
Secret image sharing with separate shadow authentication ability,
SP:IC(82), 2020, pp. 115721.
Elsevier DOI
2001
Secret image sharing, Shadow authentication, Pixel expansion, Lossless recovery
BibRef
Sardar, M.K.[Md Kutubuddin],
Adhikari, A.[Avishek],
Essential secret image sharing scheme with small and equal sized
shadows,
SP:IC(87), 2020, pp. 115923.
Elsevier DOI
2007
Grayscale image, Finite field, -threshold secret sharing scheme
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Surveys, Image Hiding, Data Hiding, Steganography .