• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
For: CHANG C, LIN C, LIN C, CHEN Y. A novel secret image sharing scheme in color images using small shadow images. Inf Sci (N Y) 2008. [DOI: 10.1016/j.ins.2007.12.016] [Citation(s) in RCA: 40] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
Number Cited by Other Article(s)
1
Li L, Chang C, Bai J, Le H, Chen C, Meen T. Hamming Code Strategy for Medical Image Sharing. ASI 2020;3:8. [DOI: 10.3390/asi3010008] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
2
Chen Y, Huang B, Juan J. A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion. Cryptography 2018;2:28. [DOI: 10.3390/cryptography2040028] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
3
Chang J, Huang B, Juan J. A New Visual Multi-Secrets Sharing Scheme by Random Grids. Cryptography 2018;2:24. [DOI: 10.3390/cryptography2030024] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
4
Verma M, Rani R. Significant Secret Image Sharing Scheme Based on Boolean Operation. Cybernetics and Information Technologies 2017. [DOI: 10.1515/cait-2017-0022] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
5
Pang L, Miao D, Li H, Wang Q. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow. ScientificWorldJournal 2015;2015:861546. [PMID: 26351657 DOI: 10.1155/2015/861546] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/23/2015] [Revised: 07/07/2015] [Accepted: 07/09/2015] [Indexed: 11/18/2022]  Open
6
Mashhadi S, Hadian Dehkordi M. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf Sci (N Y) 2015;294:31-40. [DOI: 10.1016/j.ins.2014.08.046] [Citation(s) in RCA: 34] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
7
Tedmori S, Al-najdawi N. Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci (N Y) 2014;269:21-34. [DOI: 10.1016/j.ins.2014.02.004] [Citation(s) in RCA: 67] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
8
Yuan HD. Secret sharing with multi-cover adaptive steganography. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2013.08.012] [Citation(s) in RCA: 50] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
9
Khan A, Malik SA, Ali A, Chamlawi R, Hussain M, Mahmood MT, Usman I. Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras. Inf Sci (N Y) 2012;216:155-75. [DOI: 10.1016/j.ins.2012.06.014] [Citation(s) in RCA: 30] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/20/2023]
10
Chen T, Li K. Multi-image encryption by circular random grids. Inf Sci (N Y) 2012;189:255-65. [DOI: 10.1016/j.ins.2011.11.026] [Citation(s) in RCA: 48] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
11
Li JH, Lee WB, Ye D, Liu TJ, Qin C. Adaptive Secret Sharing for Color Images. INT J COMPUT INT SYS 2011. [DOI: 10.1080/18756891.2011.9727831] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]  Open
12
Chang C, Chen Y, Wang H. Meaningful secret sharing technique with authentication and remedy abilities. Inf Sci (N Y) 2011;181:3073-84. [DOI: 10.1016/j.ins.2011.03.002] [Citation(s) in RCA: 25] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
13
Lin P, Chan C. Invertible secret image sharing with steganography. Pattern Recognit Lett 2010;31:1887-93. [DOI: 10.1016/j.patrec.2010.01.019] [Citation(s) in RCA: 94] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
14
Eslami Z, Zarepour Ahmadabadi J. A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci (N Y) 2010;180:2889-94. [DOI: 10.1016/j.ins.2010.04.015] [Citation(s) in RCA: 53] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
15
Tsai D, Horng G, Chen T, Huang Y. A novel secret image sharing scheme for true-color images with size constraint. Inf Sci (N Y) 2009;179:3247-54. [DOI: 10.1016/j.ins.2009.05.020] [Citation(s) in RCA: 41] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA