Open Access

Significant Secret Image Sharing Scheme Based on Boolean Operation


Cite

1. Blakely, G. R. Safeguarding Cryptographic Keys. – Proc. AFIPS, Vol. 48, 1979, pp. 313-317.10.1109/MARK.1979.8817296Search in Google Scholar

2. Shamir, A. How to Share a Secret. – Communications of the ACM, Vol. 22, 1979, No 11, pp. 612-613.10.1145/359168.359176Search in Google Scholar

3. Thien, C. C., J. C. Lin. Secret Image Sharing. – Computers & Graphics, Vol. 26, 2002, No 5, pp. 765-770.10.1016/S0097-8493(02)00131-0Search in Google Scholar

4. Lin, C. C., W. H. Tsai. Secret Image Sharing with Steganography and Authentication. – Journal of Systems and Software, Vol. 73, 2004, No 3, pp. 405-414.10.1016/S0164-1212(03)00239-5Search in Google Scholar

5. Wang, R. Z., C. H. Su. Secret Image Sharing with Smaller Shadow Images. – Pattern Recognition Letters, Vol. 27, 2006, No 6, pp. 551-555.10.1016/j.patrec.2005.09.021Search in Google Scholar

6. Chang, C. C., C. C. Lin, C. H. Lin, Y. H. Chen. A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images. – Information Sciences, Vol. 178, 2008, No 11, pp. 2433-2447.10.1016/j.ins.2007.12.016Search in Google Scholar

7. Tsai, D. S., G. Horng, T. H. Chen, Y. T. Huang. A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint. – Information Sciences, Vol. 179, 2009, No 19, pp. 3247-3254.10.1016/j.ins.2009.05.020Search in Google Scholar

8. Naor, M., A. Shamir. Visual Cryptography. – In: Advances in Cryptography Eurocrypt’94. Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.10.1007/BFb0053419Search in Google Scholar

9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinson. Extended Capabilities for Visual Cryptography. – Theoretical Computer Science, Vol. 250, 2001, No 1, pp. 143-161.10.1016/S0304-3975(99)00127-9Search in Google Scholar

10. Tsai, D. S., T. H. Chen, G. Horng. A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images. – Pattern Recognition, Vol. 40, 2007, No 8, pp. 2356-2366.10.1016/j.patcog.2007.01.013Search in Google Scholar

11. Lin, C. C., W. H. Tsai. Visual Cryptography for Gray-Level Images by Dithering Techniques. – Pattern Recognition Letters, Vol. 24, 2003, No 1, pp. 349-358.10.1016/S0167-8655(02)00259-3Search in Google Scholar

12. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3Search in Google Scholar

13. Hou, Y. C. Visual Cryptography for Color Images. – Pattern Recognition, Vol. 36, 2003, No 7, pp. 1619-1629.10.1016/S0031-3203(02)00258-3Search in Google Scholar

14. Wang, D., L. Zhang, N. Ma, X. Li. Two Secret Sharing Schemes Based on Boolean Operations. – Pattern Recognition, Vol. 40, 2007, No 10, pp. 2776-2785.10.1016/j.patcog.2006.11.018Search in Google Scholar

15. Chen, C. C., C. C. Chen, Y. C. Lin. Weighted Modulated Secret Image Sharing Method. – Journal of Electronic Imaging, Vol. 18, 2009, No 4, pp. 043011-043011.10.1117/1.3268362Search in Google Scholar

16. Li, P., C. N. Yang, C. C. Wu, Q. Kong, Y. Ma. Essential Secret Image Sharing Scheme with Different Importance of Shadows. – Journal of Visual Communication and Image Representation, Vol. 24, 2013, No 7, pp.1106-1114.10.1016/j.jvcir.2013.07.005Search in Google Scholar

17. Nag, A., S. Biswas, D. Sarkar, P. P. Sarka. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Information Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023Search in Google Scholar

18. Chang, C. C., C. C. Lin, T. H. N. Le, H. B. Le. Sharing a Verifiable Secret Image Using Two Shadows. – Pattern Recognition, Vol. 42, 2009, No 11, pp. 3097-3114.10.1016/j.patcog.2009.04.012Search in Google Scholar

19. Liu, H., X. Wang. Image Encryption Using DNA Complementary Rule and Chaotic Maps. – Applied Soft Computing, Vol. 12, 2012, No 5, pp. 1457-1466.10.1016/j.asoc.2012.01.016Search in Google Scholar

20. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences. – Optics Communications, Vol. 285, 2012, No 1, pp. 29-37.10.1016/j.optcom.2011.08.079Search in Google Scholar

21. Chen, T. H., C. S. Wu. Efficient Multi-Secret Image Sharing Based on Boolean Operations. – Signal Processing, Vol. 91, 2011, No 1, pp. 90-97.10.1016/j.sigpro.2010.06.012Search in Google Scholar

22. Verma, M., R. Rani. Strong Thershold Secret Image Sharing Based on Boolean Operation. – In: Proc. of International Conference on Computing, Communication and Automation (ICCCA’16), IEEE, 2016, pp. 1145-1149.10.1109/CCAA.2016.7813889Search in Google Scholar

23. Thomos, N., N. V. Boulgouris, M. G. Strintzis. Optimized Transmission of JPEG2000 Streams over Wireless Channels. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 1.10.1109/TIP.2005.860338Search in Google Scholar

24. Xiangjun, L., C. Jianfei. Robust Transmission of JPEG2000 Encoded Images over Packet Loss Channels. – ICME, School of Computer Engineering, Nanyang Technological University, 2007, pp. 947-950.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology