Create New Account
Login
Search or Buy Articles
Browse Journals
Browse Proceedings
Submit your Paper
Submission Information
Journal Review
Recommend to Your Library
Call for Papers
A RELIABLE (
k
,
n
) IMAGE SECRET SHARING SCHEME WITH LOW INFORMATION OVERHEAD
L. Bai
References
[1] C.-C. Thien & J.-C. Lin, Secret image sharing, Computers & Graphics, 26 (5), 2002, 765–770.
[2] G. Blakley, Safeguarding crypographic keys, Proc. AFIPS1979 National Computer Conference, 48, Arlington, VA, 1979,313–317.
[3] A. Shamir, How to share a secret, Communications of theACM, 22 (11), 1979, 612–613.
[4] E.D. Karnin, J.W. Greene, & M.E. Hellman, On secret sharing systems, IT-29(1), 1983, 35–41.
[5] K. Kurosawa, K. Okada, K. Sakano, W. Ogata, & S. Tsujii, Nonperfect secret sharing schemes and matroids, Lecture Notes in Computer Science, 765, 1994, 126–141. [Online]. Available: citeseer.ist.psu.edu/article/kurosawa94nonperfect.html
[6] K. Srinathan, N. Tharani Rajan, & C. Pandu Rangan, Non-perfect secret sharing over general access structures, IN-DOCRYPT, 2002, 409–421.
[7] A. Beimel & B. Chor, Secret sharing with public reconstruction, 44 (5), 1998, 1887–1896.
[8] A. De Santis & B. Masucci, Multiple ramp schemes, 45 (5), 1999, 1720–1728.
[9] M. Naor & A. Shamir, Visual cryptography, Proc. Conf. on Advances in Cryptology – Eurocrypt ’94 (A. De Santis, Ed.), Berlin, Germany, 1994, 1–12.
[10] S. Cimato, R.D. Prisco, & A.D. Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49 (1), 2006, 97–107.
[11] C. Blundo, S. Cimato, & A.D. Santis, Visual cryptogra-phy schemes with optimal pixel expansion, Theoretical Com-puter Science, 38 (5), 2006, 767–772. [Online]. Available:http://eprint.iacr.org/2006/170
[12] R. Lukac & K.N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, 38 (5), 2005, 767–772.
[13] R. Lukac & K.N. Plataniotis, A cost-effective encryption scheme for color images, Real-Time Imaging, 11 (5–6), 2005, 454–464.
[14] R. Lukac & K.N. Plataniotis, Digital image indexing using secret sharing schemes: A unified framework for single-sensor consumer electronics, IEEE Transactions on Consumer Electronics, 51 (3), 2005, 908–916.
[15] R. Lukac & K.N. Plataniotis, Secure single-sensor digital camera, IEE Electronics Letters, 42 (11), 2006, 627–629.
[16] L. Bai, A strong ramp secret sharing scheme using matrix projection, 2nd Int. Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY, 2006.
[17] R.M. Capocelli, A. De Santis, L. Gargano, & U. Vaccaro, On the size of shares for secret sharing schemes, Advances in Cryptology – Crypto ’91 (J. Feigenbaum, Ed.), 576, Santa Barbara, California, USA, 1991, 101–113.
Important Links:
Abstract
DOI:
10.2316/Journal.202.2010.1.202-2307
From Journal
(202) International Journal of Computers and Applications - 2010
Go Back