簡易檢索 / 詳目顯示

研究生: 范佐搖
Tzuo-Yai Fan
論文名稱: 視覺機密分享之擴展與應用
The Extension and Application of Visual Secret Sharing
指導教授: 邱炳樟
Bin-Chang Chieu
趙和昌
Her-Chang Chao
口試委員: 陳建中
Jiann-Jone Chen
林益如
Yi-Ru Lin
陳榮堅
Rong-Jian Chen
徐熊健
Shyong-Jian Shyu
王任瓚
Ran-Zan Wang
學位類別: 博士
Doctor
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 207
中文關鍵詞: 視覺機密分享隨機網格優先權式視覺機密分享友善視覺機密分享多階層式視覺機密分享醫療影像浮水印機制細胞自動機轉換
外文關鍵詞: Visual secret sharing, Random grid, Priority visual secret sharing, Friendly visual secret sharing, Multi–level visual secret sharing, Medical image watermarking scheme, Cellular automata transform
相關次數: 點閱:186下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 視覺機密分享(Visual Secret Sharing, VSS)機制是一種簡易且安全的影像加密技術。一般的VSS機制主要是將一個二元的機密影像加密至多張影像。每張影像看似雜訊並稱為share。最重要的是從單一share的外觀上絕對無法察覺到任何與機密影像有關的訊息。當要取回機密影像的訊息時,收集一定張數或以上的share,並且將這些share疊合後可取得疊合影像,疊合影像中存在著不同亮度(白色像素不同比例)的區域,即可透過肉眼辨識出機密影像的訊息。反之,如果疊合小於一定張數的share,則無法取得任何機密影像的訊息。
    在一般的VSS機制有一個特點,即是對於參與者各自所持有的share,除了收集一定張數的share才能取回機密影像,且每張share所能夠還原機密影像的能力皆相同。換句話說,無論任何share到齊所還原的機密影像其清晰程度皆一致。事實上,在一些情況時參與者的優先權程度是不一樣的,代表參與者所持有的share,其能夠還原機密影像的能力並不相同。在本文中,分別提出兩個不同的優先權式的VSS (Priority VSS, PVSS)機制,在提出的PVSS機制中滿足以下特點:第一,每張share的優先權是需要可被調整的,對於應用才有足夠的彈性;第二,每張share除了無法透漏與機密影像有關的訊息,也不能夠洩漏share本身的優先權程度,有完整的安全性;最後,每張share所還原機密的能力是與各自優先權有關。
    另一個一般的VSS機制特點,是所產生的share外觀上皆是無意義的雜訊影像,雖有良好的安全性,但也造成管理上的不便,倘若不經意混淆了所持有的share,將可能造成還原機密影像的困難。在本文中,分別提出兩個不同的友善的VSS (Friendly VSS)機制,在第一個方法中,首要目的是讓share的外觀上呈現掩護影像的訊息,並且在視覺上呈現多階層的掩護影像內容。在第二個機制中,除了讓share的外觀上是有意義的訊息,還讓所還原的機密影像,在視覺上呈現多階層的機密影像內容,讓所還原的機密影像的視覺品質相當良好。
    最後,本研究提出一種基於VSS的醫療影像浮水印機制。這方法有以下特性:(a)不需要修改欲保護影像,從而保持其醫療影像的品質,並不會因為有任何失真而產生醫療糾紛;(b)根據影像的特徵與VSS將產生所有權分享影像和主要分享影像,並且通過將所有權分享影像和主要分享影像相結合來提取隱藏的浮水印;(c)所有權分享影像的外觀上是呈現掩護影像的內容,使得所有權分享影像在管理上較為便利;(d)浮水印的尺寸與欲保護影像無關。
    總體而言,在本文中所提出的機制,由各章節對於各個機制的實驗結果與分析可知,對於本文方法的效能上,與先前學者的方法比較起來皆來的好,讓不同視覺密碼機制的方法與應用上,可以更為精進。


    Visual secret sharing (VSS) is a simple and secure image–encryption technology. Conventional VSS schemes primarily encrypt a given binary image into multiple images, each one of them resembling noise and being referred to as a share. The most important feature of VSS is that it is absolutely impossible to discern any secret image–related information by using the exterior appearance of a single share alone. When trying to retrieve secret–image–related information, a minimal number of shares should be collected and then superimposed to form a stacked image, in which there are regions showing different levels of brightness (with different white–pixel ratios), and the secret image related information can be discerned by visually observing the regions with the human naked eye. However, if the number of stacked shares is less than a threshold value, it is impossible to retrieve any secret image-related information.
    Conventional VSS schemes have a feature in common that each share, held by a different participant, has the same ability to recover a given secret image. Additionally, only after a certain number of shares are collected it is possible to retrieve the secret image. In other words, a combination of the same number of randomly selected shares, in sufficient quantity, will make the recovered images have the same clarity. In some circumstances, the priorities may be different among the participants, meaning that the shares held by them may have different abilities to recover a given secret image. This study proposes two different types of priority VSS schemes, in which the following requirements are fulfilled: first, the priority of each share can be adjusted when necessary, providing sufficient flexibility in the use of shares. Second, each share is unable to reveal either secret image-related information or the priority weighting of the share, which ensures an integrated security. Finally, the ability of each share for recovering the secret is associated with the priority weighting of the share.
    Another feature of the conventional VSS schemes is that all the generated shares are images with noise–like exterior appearance. Despite providing good security, this would result in management inconvenience if a share is mistaken for another one, likely making it difficult to recover the secret image. This study proposes two different friendly VSS schemes. The first scheme primarily aims at not only presenting cover-image information in the exterior appearance of shares but also visually presenting multi–level contents of the cover images. The second scheme, on top of allowing each share to present meaningful information in the exterior appearance, also allows the multi–level contents of the secret image to be visually presented, generating good visual quality in the recovered image.
    Finally, this study proposes a VSS based medical image watermarking scheme, which has the following characteristics: (a) it does not require any modification of the image that is to be protected, thereby maintaining the quality of the medical image and avoiding medical disputes due to any image distortion; (b) it generates an ownership share image and a master share image, according to the image characteristics and VSS, and extracts the hidden watermarks by combining the two images; (c) cover image content is depicted in the appearance of the ownership share image, thereby making the management of ownership share image convenient; (d) the size of the watermark is independent of the image to be protected.
    Overall, the schemes presented in this manuscript, as demonstrated through the experimental results and data analysis described in each Chapter and Section, outperform earlier schemes proposed by other researchers, and would further enhance the development of methods and their application to different visual encryption schemes

    中文摘要 i Abstract iii Acknowledgement vi List of Figures xi List of Tables xv Chapter 1 Introduction 1 1.1 Visual Secret Sharing 6 1.2 Random Grid Visual Secret Sharing 14 1.3 Thesis Plan 22 1.4 Abbreviation 24 1.5 Notation 27 Chapter 2 (2, n)–threshold Priority Visual Secret Sharing of random grid 31 2.1 Related Works 32 2.1.1 Hou's PVSS Approach 32 2.1.2 Yang's PVSS Approach 36 2.2 Motivation of (2, n)–threshold RGPVSS scheme 41 2.3 The Proposed (2, n)–threshold RGPVSS scheme 43 2.4 Experiment Result of (2, n)–threshold RGPVSS scheme 51 2.5 Summary of (2, n)–threshold RGPVSS scheme 62 Chapter 3 (k, n)–threshold Priority Visual Secret Sharing of Random Grid 65 3.1 Related Works 66 3.1.1 Shyu's (k, k)–threshold RGPVSS Scheme 66 3.1.2 Review of (k, n)–threshold RGPVSS Scheme 68 3.2 The Proposed (k, n)–threshold RGPVSS Scheme 69 3.3 Experiment Result of (k, n)–threshold RGPVSS Scheme 75 3.4 Summary of (k, n)–threshold RGPVSS Scheme 85 Chapter 4 Generalized Random-grid-based Visual Secret Sharing with Multiple-Level Meaningful Shares 87 4.1 Related Works 88 4.1.1 Wu's GVSS Scheme 88 4.1.2 Wu's GFVSS Scheme 92 4.2 Motivation of GFVSS Scheme 93 4.3 The Proposed GFVSS Scheme 95 4.3.1 GVSS Scheme 95 4.3.2 GFVSS Scheme 103 4.4 Experiment Result of GFVSS scheme 106 4.5 Summary of GFVSS scheme 113 Chapter 5 Generating Random Grid-based Visual Secret Sharing with Multi-level Encoding 115 5.1 Related Works 116 5.1.1 Chen's MVSS Scheme 116 5.1.2 Lee's MVSS Scheme 118 5.2 The Proposed MVSS and MFVSS Scheme 120 5.2.1 The MVSS Scheme 121 5.2.2 The MFVSS Scheme 125 5.3 Experiment Result of MVSS and MFVSS schemes 127 5.4 Summary of MVSS and MFVSS schemes 139 Chapter 6 Lossless Image Watermarking Method Based on Visual Secret Sharing 141 6.1 Related Works 144 6.1.1 Review of Watermarking Method Based on Visual Secret Sharing 144 6.1.2 Cellular Automata Transform 147 6.2 The Proposed VSS-based Watermarking Scheme 151 6.3 Experiment Result of VSS-based Watermarking Scheme 161 6.4 Summary of VSS-based Watermarking Scheme 173 Chapter 7 Conclusions and Future Works 141 References 179

    [1.] M. Naor and A. Shamir, "Visual cryptography," in: Advances in Cryptology-EuroCrypt94, Lect. Notes in Comput. Sci., vol. 950, pp. 1–12, 1995.
    [2.] T. Katoh and H. Imai, "An extended construction method for visual secret sharing schemes," Electron. Commun. JAP. Pt. III-Fundam. Electron. Sci., vol. 81, no. 7, pp. 55–63, 1998.
    [3.] C. Blundo and A. De Santis, "Visual cryptography schemes with perfect reconstruction of black pixels," Comput. Graph., vol. 22, no. 4, pp. 449–455, 1998.
    [4.] S. Climato, R. De Prosco, and A. De Santis, "Optimal colored threshold visual cryptography schemes," Designs Codes Cryptogr., vol. 35, pp. 311–335, 2005.
    [5.] M. Bose and R. Mukerjee, "Optimal (2, n) visual cryptography schemes," Designs Codes Cryptogr., vol. 40, no. 3, pp. 255–267, 2006.
    [6.] S. J. Shyu and M. C. Chen, "Optimum pixel expansions for threshold visual secret sharing schemes," IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 960–969, 2011.
    [7.] S. J. Shyu and H. W. Jiang, "Efficient construction for region incrementing visual cryptography," IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 5, pp. 769–777, 2012.
    [8.] C. N. Yang, C. C. Wu, and Y. C. Lin, "K out of n region-based progressive visual cryptography," IEEE Trans. Circuits Syst. Video Technol., vol. PP, no. 99, pp. 1–1, 2017.
    [9.] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Comput., vol. 129, no. 2, pp. 86–106, 1996.
    [10.] M. Uno and M. Kano, "Visual secret sharing schemes with cyclic access structure for many images," Int. Conf. Inf. Secur. Cryptol., pp. 84–97, 2008.
    [11.] K. H. Lee and P. L. Chiu, "An extended visual cryptography algorithm for general access structures," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 1, pp. 219–229, 2012.
    [12.] S. J. Shyu and M. C. Chen, "Minimizing pixel expansion in visual cryptographic scheme for general access structures," IEEE Trans. Circuits Syst. Video Technol., vol. 25, no. 9, pp. 1557–1561, 2015.
    [13.] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Extended schemes for visual cryptography," Theor. Comput. Sci., vol. 250, no. 1–2, pp. 143–161, 2001.
    [14.] D. Wang, F. Yi, and X. Li, "On general construction for extended visual cryptography schemes," Pattern Recognit., vol. 42, no. 11, pp. 3071–3082, 2009.
    [15.] S. J. Shyu, "Threshold visual cryptographic scheme with meaningful shares," IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1521–1525, 2014.
    [16.] P. L. Chiu and K. H. Lee, "User-friendly threshold visual cryptography with complementary cover images," Signal Process., vol. 108, pp. 476–488, 2015.
    [17.] D. Ou, W. Sun, and X. Wu, "Non-expansible XOR-based visual cryptography scheme with meaningful shares," Signal Process., vol. 108, pp. 604–621, 2015.
    [18.] W. P. Fang and J. C. Lin, "Progressive viewing and sharing of sensitive images," Pattern Recognit. Imag. Anal., vol. 16, no. 4, pp. 632–636, 2006.
    [19.] Y. C. Hou, and Z. Y. Quan, "Progressive visual cryptography with unexpanded shares," IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1760–1764, 2011.
    [20.] C. H. Lin, Y. S. Lee, and T. H. Chen, "Friendly progressive random-grid-based visual secret sharing with adaptive contrast," J. Vis. Commun. Imag. R., vol. 33 pp. 31–41, 2015.
    [21.] H. C. Chao and T. Y. Fan, "XOR-based progressive visual secret sharing using generalized random grids," Displays, vol. 49, pp. 6–15. 2017.
    [22.] Y. C. Hou, Z. Y. Quan, and C. F. Tsai, "A privilege-based visual secret sharing model," J. Vis. Commun. Imag. R., vol. 33, pp. 358–367, 2015.
    [23.] C. N. Yang, H. K. Liao, and D. S. Wang, "New privilege-based visual cryptography with arbitrary privilege levels," J. Vis. Commun. Imag. R., vol. 42, pp. 121–131, 2017.
    [24.] H. C. Huang, Y. Y. Lu, and J. Lin, "Ownership protection for progressive image transmission with reversible data hiding and visual secret sharing," Optik-Int. J. Light Electron. Optics, vol. 127, no. 15, pp. 5950–5960, 2016.
    [25.] P. Singh and B. Raman, "Reversible data hiding based on Shamir’s secret sharing for color images over cloud," Inf. Sci., vol. 422, pp. 77–97, 2108.
    [26.] X. Wu, J. Weng, and W. Yan, "Adopting secret sharing for reversible data hiding in encrypted images," Signal Process., vol. 143, pp. 269–281, 2108.
    [27.] M. Naor, B. Pinka, "Visual authentication and identification," in Adv. Cryptol.-CRYPTO97, vol. 1294, pp. 322–336, 2006.
    [28.] T. Y. Fan, B. C. Chieu, and H. C. Chao, "Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques," J. Electron. Image, vol. 21, no. 4, pp. 043018, 2012.
    [29.] Z. Shao, Y. Shang, R. Zeng, H. Shu, G. Coatrieux, and J. Wu, "Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography," Signal Process.-Image Commun., vol. 48, pp. 12–21, 2016.
    [30.] K. Brindha and N. Jeyanthi, "Secured document sharing using visual cryptography in cloud data storage," Cybern. Inf. Technol., vol. 15, no. 4, pp. 111–123, 2015.
    [31.] R. Ito, H. Kuwakado, and H. Tanaka, "Image size invariant visual cryptography," IEICE Trans. Fund. Electron., Commun. Comput. Sci., vol. E82–A, no. 10, pp. 2172–2177, 1999.
    [32.] C. N. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognit. Lett., vol. 25, no. 4, pp. 481–494, 2004.
    [33.] D. Wang, F. Yi, and X. Li, "Probabilistic visual secret sharing schemes for grey-scale images and color images," Inf. Sci., vol. 181, no. 11, pp. 2189–2208, 2011.
    [34.] S. F. Tu and Y. C. Hou, "Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images," Image Sci. J., vol. 55, no. 2, pp. 90–101, 2007.
    [35.] O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Opt. Lett., vol. 12, pp. 377–379, 1987.
    [36.] S. J. Shyu, "Visual cryptograms of random grids for threshold access structures," Theor. Comput. Sci., vol. 565, pp. 30–49, 2015.
    [37.] S. J. Shyu, "Image encryption by random grids," Pattern Recognit., vol. 40, no. 3, pp. 1014–1031, 2007.
    [38.] S. K. Chen and S. J. Lin, "Optimal (2, n) and (2, infinity) visual secret sharing by generalized random grids," J. Vis. Commun. Image R., vol. 23, pp. 677–684, 2012.
    [39.] T. H. Chen, Y. S. Lee, W. L. Huang, J. S. T. Juan, Y. Y. Chen, and M. J. Li, "Quality-adaptive visual secret sharing by random grids," J. Syst. Softw., vol. 86, no. 5, pp. 1267–1274, 2013.
    [40.] X. Wu and W. Sun, "Generalized random grid and its applications in visual cryptography," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 9, pp. 1541–1553, 2013.
    [41.] T. Guo, F. Liu, and C. Wu, "K out of k extended visual cryptography scheme by random grids," Signal Process., vol. 94, pp. 90–101, 2014.
    [42.] T. H. Chen and K. H. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognit., vol. 42, no. 9, pp. 2203–2217, 2009.
    [43.] S. J. Shyu, "Image encryption by multiple random grids," Pattern Recognit., vol. 42, no. 7, pp. 1582–1596, 2009.
    [44.] T. H. Chen and K. H. Tsao, "Threshold visual secret sharing by random grids," J. Syst. Softw., vol. 84, no. 7, pp. 1197–1208, 2011.
    [45.] X. Wu and W. Sun, "Improving the visual quality of random grid-based visual secret sharing," Signal Process., vol. 93, no. 5, pp. 977–995, 2013.
    [46.] S. Kumar and R. K. Sharma, "Threshold visual secret sharing based on Boolean operations," Secur. Comm. Netw., vol. 7, pp. 653–664, 2014.
    [47.] X. Yan, X. Liu, and C. N. Yang, "An enhanced threshold visual secret sharing based on random grids," J. Real-Time Image Process., pp. 1–13, 2015.
    [48.] X. Wu and W. Sun, "Visual secret sharing for general access structures by random grids," IET Inf. Secur., vol. 6, no. 4, pp. 299–309, 2012.
    [49.] S. J. Shyu, "Visual cryptograms of random grids for general access structures," IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 3, pp. 414–424, 2013.
    [50.] X. Yan and Y. Lu, "Contrast-improved visual secret sharing based on random grid for general access structures," Digit. Signal Process., vol. 71, pp. 36–45, 2017.
    [51.] T. H. Chen and K. H. Tsao, "User-friendly random-grid-based visual secret sharing," IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693–1703, 2011.
    [52.] Y. C. Hou, S. C. Wei, and C. Y. Lin, "Random-grid-based visual cryptography schemes," IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 5, pp. 733–744, 2014.
    [53.] Y. F. Chen, Y. K. Chen, C. C. Huang, M. H. Tsai, and Y. P. Chu, "A multiple-level visual secret-sharing scheme without image size expansion," Inf. Sci., vol. 177, no. 21, pp. 4696–4710, 2007.
    [54.] C. C. Lee, H. H. Chen, H. T. Liu, G. W. Chen, and C. S. Tsai, "A new visual cryptography with multi-level encoding," J. Vis. Lang. Comput., vol. 25, no. 3, pp. 243–250, 2014.
    [55.] N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans Syst. Man Cybern., vol. 9, no. 1, pp. 62–66, 1979.
    [56.] M. S. Fu and O. C. Au, "Data hiding watermarking for halftone images," IEEE Trans. Image Process., vol. 11, no. 4, pp. 477–484, 2002.
    [57.] M. Abo-Zahhad, S. M. Ahmed, and O. Elnahas, "A wireless emergency telemedicine system for patients monitoring and diagnosis," Int. J Telemed. Appl., vol. 4, pp. 1–11, 2014.
    [58.] D. D. Prasad, S. Ray, A. K. Majumdar, J. Mukherjee, B. Majumdar, S. Paul, and A. Verma, "Real time medical image consultation system through Internet," J. Healthc. Eng., vol. 1, pp. 141–154, 2010.
    [59.] Y. C. Weng and S. L. Hsieh, "Design and implementation of a web-based medical drawing management system," J. Intell. Inf. Syst., vol. 49, no. 3, pp. 391–405, 2017.
    [60.] A. K. Singh, M. Dave, A. Mohan, "Robust and secure multiple watermarking in wavelet domain," J. Med. Imaging Health Inform., vol. 5, no. 2, pp. 406–414, 2015.
    [61.] H. Nyeem, W. Boles, and C. Boyd, "A review of medical image watermarking requirements for teleradiology," J. digit. Imaging, vol. 26, no. 2, pp. 326–343, 2013.
    [62.] S. A. Parah, F. Ahad, J. A. Sheikh, and G. M. Bhat, "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique," J. Biomed. Inform., vol. 66, pp. 214–230, 2017.
    [63.] G. Alvarez, S. Li, and L. Hernandez, "Analysis of security problems in a medical image encryption system," Comput. Biol. Med., vol. 37, no. 3, pp. 424–427, 2007.
    [64.] M. S. Wang and W. C. Chen, "Robust copyright protection scheme based on discrete cosine transform and secret sharing techniques," J. Electron. Imaging, vol. 17, no. 2, pp. 023006, 2008.
    [65.] S. Rawat and B. Raman, "A blind watermarking algorithm based on fractional Fourier transform and visual cryptography," Signal Process., vol. 92, no. 6, pp. 1480–1491, 2012.
    [66.] V. Seenivasagam and R. Velumani, "A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud," Comput. Math. Methods Med., vol. 2013, 2013.
    [67.] C. Kavitha and S. Sakthivel, "An effective mechanism for medical images authentication using quick response code," Cluster Comout., pp. 1–8, 2018.
    [68.] J. Dong and J. Li, "A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain," In Innovation in Medicine Healthcare, pp. 197–208, 2016.
    [69.] W. Chen, X. Li, S. Zhan, and D. Niu, "Multimedia video watermarking algorithm using SVD and secret shariing," 2018 2nd IEEE Advanced Inform. Managem., Comm., Electron. Automation Control Conference (IMCEC), pp. 1682–1686, 2018.
    [70.] M. Ali, C. W. Ahn, M. Pant, "An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fraction al Fourier transforms," Multimedia Tools Appl., vol. 77, no. 10, pp. 11751–11773, 2018.
    [71.] M. Ghadi, L. Laouamer, L. Nana, and A. Pascu, "A novel zero-watermarking approach of medical images based on Jacobian matrix model," Secur. Commun. Netw., vol. 9, no. 18, pp. 5203–5218, 2016.
    [72.] A. Singh and M. K. Dutta, "A robust zero-watermarking scheme for teleophthalmological applications," J King Saud University–Comput. Inf. Sci., available online, 2017.
    [73.] T. M. Thanh and K. Tanaka, "An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information," Multimedia Tools Appl., vol. 76, no. 11, pp. 13455–13471, 2017.
    [74.] O. Lafe, Cellular Automata Transforms: Theory and Applications In Multimedia Compression, Encryption and Modeling, Springer, 2000.
    [75.] R. J. Chen, C. F. Tai, and J. L. Lai, "Novel CAT wavelets-based image coding system," IEEE International Symposium on Consumer Electronics, 2007. ISCE 2007, pp. 1–6, 2007.
    [76.] Z. Eslami, S. H. Razzaghi, and J. Z. Ahmadabadi, "Secret image sharing based on cellular automata and steganography," Pattern Recognit., vol. 43, no. 1, pp. 397–404, 2010.
    [77.] R. Shiba, S. Kang, and Y. Aoki, "An image watermarking technique using cellular automata transform," In TENCON 2004. 2004 IEEE Region 10 Conference, pp. 303–306, 2004.

    QR CODE