Asmuth C, Bloom J. A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29(2):208-210.
[2]
Karnin E, Green J W, Hellman M E. On sharing secret systems[J]. IEEE Transactions on Information Theory, 1983, 29(1):35-41.
[3]
Thien C C, Lin J C. Secret image sharing[J]. Computers & Graphics, 2002, 26(5):765-770.
[4]
Shyu S J, Chen Y R. Threshold secret Image sharing by chinese remainder theorem[C]// Proceedings of Asia-Pacific Services Computing Conference. Yilan, Taiwan, China: IEEE, 2008, 1332-1337.
[5]
Ulutas M, Nabiyev V V, Ulutas G. A new secret image sharing technique based on Asmuth Bloom\'s scheme[C]// Proceedings of International Conference on Application of Information and Communication Technologies. Azerbaijan, Baku: IEEE, 2009, 1-5.
[6]
Chen C C, Fu W Y. A geometry-based secret image sharing approach[J]. Journal of Information Science and Engineering, 2008, 24(5):1567-1577.
[7]
Tso H K. Sharing secret images using Blakley\'s concept[J]. Optical Engineering, 2008, 47(7):11-13.
[8]
Wu X T, Sun W. Image sharing scheme based on error diffusion[J]. Journal of Computer Applications, 2011, 31(1):74-77. [吴小天,孙伟. 基于误差扩散的图像分存方案[J]. 计算机应用,2011,31(1):74-77.]
[9]
Ou D H, Wu X T, Sun W, et al. Secret gray-level image sharing scheme based on recovery function and error diffusion[J]. Computer Science, 2013, 40(2):112-116. [欧锻灏,吴小天,孙伟,等. 基于恢复函数和误差扩散的灰度图像分存方案[J]. 计算机科学,2013,40(2):112-116.]
[10]
Eslami Z, Razzaghi S H, Zarepour A J. Secret image sharing based on cellular automata and steganography[J]. Pattern Recognition, 2010, 43(1):397-404.
[11]
Wu X T, Sun W. Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform[J]. Journal of Systems and Software, 2013,86(4):1068-1088.
[12]
Shamir A. How to share a secret[J]. Communications of ACM, 1979, 22(11):612-613.
[13]
Blakley G R. Safeguarding cryptographic keys[C]// Proceedings of AFIPS 1979 National Computer Conference. New York: AFIPS, 1979, 48:313-317.
[14]
Lin C C, Tsai W H. Secret image sharing with steganography and authentication[J]. Journal of Systems and Software, 2004, 73(3):405-414.
[15]
Yang C N, Chen T S, Yu K H, et al. Improvements of image sharing with steganography and authentication[J]. Journal of Systems and Software, 2007, 80(7):1070-1076.
[16]
Chang C C, Hsieh Y P, Lin C H. Sharing secrets in stego images with authentication[J]. Pattern Recognition, 2008, 41(10):3130-3137.
[17]
Chang C C, Chen Y H, Wang H C. Meaningful secret sharing technique with authentication and remedy abilities[J]. Information Sciences, 2011,181(14):3073-3084.
[18]
Chen Y H, Chang C C. Image tamper detection and recovery based on dual watermarks sharing strategy[J]. Journal of Digital Information Management, 2012, 10(1):39-49.
[19]
Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8):890-896.