2008
DOI: 10.1016/j.patcog.2007.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Friendly progressive visual secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
53
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(66 citation statements)
references
References 13 publications
0
53
0
Order By: Relevance
“…Then, many researchers proposed other functional secret image sharing schemes, such as reduced load for sharing multiple secret images 2,3 , cheater identification 4 , progressive sharing 5,6 , weighted sharing 7 , visual cryptography and secret image sharing 8 , authentication strength 9 , and scalable sharing 10 .…”
Section: Introductionmentioning
confidence: 99%
“…Then, many researchers proposed other functional secret image sharing schemes, such as reduced load for sharing multiple secret images 2,3 , cheater identification 4 , progressive sharing 5,6 , weighted sharing 7 , visual cryptography and secret image sharing 8 , authentication strength 9 , and scalable sharing 10 .…”
Section: Introductionmentioning
confidence: 99%
“…Blakley and Shamir [1,2] first conceptualized the idea of a (t, n) threshold secret sharing scheme, in which at least a minimum number t out of n participants are required in order to recover the secret. This scheme has been extended by various researchers [3][4][5][6][7][8][9][10][11][12][13][14][15][16] and successfully applied to activities such as protection of PDF files [12], visual cryptography [13,14], and network communication [15]. For digital media, many schemes for ensuring image sharing security have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Lin and Tsai proposed image sharing schemes with authentication capabilities [9], or with reduction of share size [10]. Further, some approaches are devoted to progressively decoding secrets [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, in some situations where a computer is not available to the decipherer, a vision-based secret sharing method provides an apt solution. As regards visual secret sharing research, encryption methods may differ between pixel expansion skill [4,5,6,7,8,9,10,11] and pixel non-expansion skill [12,13,14,15,16]. The majority of the sharing images generated by the above two encryption skills is chaotic, but provides meaningful images [4,9,10].…”
Section: Introductionmentioning
confidence: 99%