TY - JOUR AU - Shamir, A. PY - 1979 DA - 1979// TI - How to share a secret JO - Commun. ACM VL - 22 UR - https://doi.org/10.1145/359168.359176 DO - 10.1145/359168.359176 ID - Shamir1979 ER - TY - JOUR AU - Liu, Y. N. AU - Cheng, C. AU - Cao, J. Y. AU - Jiang, T. PY - 2013 DA - 2013// TI - An improved authenticated group key transfer protocol based on secret sharing JO - IEEE Trans. Comput VL - 62 UR - https://doi.org/10.1109/TC.2012.216 DO - 10.1109/TC.2012.216 ID - Liu2013 ER - TY - JOUR AU - Thien, C. C. AU - Lin, J. C. PY - 2002 DA - 2002// TI - Secret image sharing JO - Comput. Graph VL - 26 UR - https://doi.org/10.1016/S0097-8493(02)00131-0 DO - 10.1016/S0097-8493(02)00131-0 ID - Thien2002 ER - TY - JOUR AU - Yang, C. N. AU - Chu, Y. Y. PY - 2011 DA - 2011// TI - A general (k,n) scalable secret image sharing scheme with smooth scalability JO - J. Syst. Softw VL - 84 UR - https://doi.org/10.1016/j.jss.2011.05.008 DO - 10.1016/j.jss.2011.05.008 ID - Yang2011 ER - TY - JOUR AU - Liu, Y. X. AU - Yang, C. Y. AU - Yeh, P. H. PY - 2014 DA - 2014// TI - Reducing shadow size in smooth scalable secret image sharing JO - Secur. Commun. Netw VL - 7 UR - https://doi.org/10.1002/sec.930 DO - 10.1002/sec.930 ID - Liu2014 ER - TY - JOUR AU - Liu, Y. X. PY - 2017 DA - 2017// TI - Scalable secret image sharing scheme with essential shadows JO - Signal Proc. Image Commun VL - 58 UR - https://doi.org/10.1016/j.image.2017.06.011 DO - 10.1016/j.image.2017.06.011 ID - Liu2017 ER - TY - JOUR AU - Wang, R. Z. PY - 2009 DA - 2009// TI - Region incrementing visual cryptography JO - IEEE Signal Proc. Lett VL - 16 UR - https://doi.org/10.1109/LSP.2009.2021334 DO - 10.1109/LSP.2009.2021334 ID - Wang2009 ER - TY - JOUR AU - Yang, C. N. AU - Shih, H. W. AU - Wu, C. C. AU - Harn, L. PY - 2012 DA - 2012// TI - k out of n region incrementing scheme in visual cryptography JO - IEEE Trans. Circ. Syst. Video Technol VL - 22 UR - https://doi.org/10.1109/TCSVT.2011.2180952 DO - 10.1109/TCSVT.2011.2180952 ID - Yang2012 ER - TY - STD TI - CN Yang, YC Lin, CC Wu, in Proc. IWDW2012, LNCS, 7809. Region in region incrementing visual cryptography scheme, (2013), pp. 449–463. ID - ref9 ER - TY - JOUR AU - Harn, L. AU - Lin, C. PY - 2009 DA - 2009// TI - Detection and identification of cheaters in (t,n) secret sharing scheme JO - Des. Codes. Crypt VL - 52 UR - https://doi.org/10.1007/s10623-008-9265-8 DO - 10.1007/s10623-008-9265-8 ID - Harn2009 ER - TY - CHAP AU - Pieprzyk, J. AU - Zhang, X. M. PY - 2002 DA - 2002// TI - Cheating prevention in linear secret sharing. BT - Proceedings of ACISP, LNCS 2384 PB - Springer CY - Heidelberg ID - Pieprzyk2002 ER - TY - JOUR AU - Sergio, C. AU - Carles, P. AU - German, S. PY - 2002 DA - 2002// TI - Secret sharing schemes with detection of cheaters for a general access structure JO - Des. Codes. Crypt VL - 25 UR - https://doi.org/10.1023/A:1013856431727 DO - 10.1023/A:1013856431727 ID - Sergio2002 ER - TY - CHAP AU - Kurosawa, K. AU - Obana, S. AU - Ogata, W. PY - 1995 DA - 1995// TI - t-cheater identifiable (k,n) secret sharing schemes. BT - Proceedings of CRYPTO, LNCS 563 PB - Springer CY - Heidelberg ID - Kurosawa1995 ER - TY - STD TI - S Obana, in Proceedings of EUROCRYPT, LNCS 6632. Almost optimum t-cheater identifiable secret sharing schemes, (2011), pp. 284–302. ID - ref14 ER - TY - JOUR AU - Liu, Y. X. PY - 2014 DA - 2014// TI - Efficient t-cheater identifiable (k,n) secret sharing scheme for t≤⌊k−22⌋$t\leq \lfloor \frac {k-2}{2}\rfloor $ JO - IET Inf. Secur VL - 8 UR - https://doi.org/10.1049/iet-ifs.2012.0322 DO - 10.1049/iet-ifs.2012.0322 ID - Liu2014 ER - TY - JOUR AU - Lin, C. C. AU - Tsai, W. H. PY - 2004 DA - 2004// TI - Secret image sharing with steganography and authentication JO - J. Syst. Softw VL - 73 UR - https://doi.org/10.1016/S0164-1212(03)00239-5 DO - 10.1016/S0164-1212(03)00239-5 ID - Lin2004 ER - TY - JOUR AU - Yang, C. N. AU - Chen, T. S. AU - Yu, K. H. AU - Wang, C. C. PY - 2007 DA - 2007// TI - Improvements of image sharing with steganography and authentication JO - J. Syst. Softw VL - 80 UR - https://doi.org/10.1016/j.jss.2006.11.022 DO - 10.1016/j.jss.2006.11.022 ID - Yang2007 ER - TY - JOUR AU - Chang, C. C. AU - Hsieh, Y. P. AU - Lin, C. H. PY - 2008 DA - 2008// TI - Sharing secrets in stego images with authentication JO - Pattern Recog VL - 41 UR - https://doi.org/10.1016/j.patcog.2008.04.006 DO - 10.1016/j.patcog.2008.04.006 ID - Chang2008 ER - TY - JOUR AU - Yang, C. N. AU - Quyang, J. F. AU - Harn, L. PY - 2012 DA - 2012// TI - Steganography and authentication in image sharing without party bits JO - Optics Commun VL - 285 UR - https://doi.org/10.1016/j.optcom.2011.12.003 DO - 10.1016/j.optcom.2011.12.003 ID - Yang2012 ER - TY - JOUR AU - Tompa, M. AU - Woll, H. PY - 1989 DA - 1989// TI - How to share a secret with cheaters JO - J. Cryptol VL - 1 UR - https://doi.org/10.1007/BF02252871 DO - 10.1007/BF02252871 ID - Tompa1989 ER -