[1] | Shamir, “How to share a secret,” Communication of the ACM, Vol. 22, no. 11, 1979, pp. 612-613. |
[2] | L Bai, “A reliable (k, n) image secret sharing scheme with low information overhead,”. Int. J. Compt. Appl. 32(1), 9–14 (2010). |
[3] | R. Wang, Y. Lan, Y. Lee, SY Huang, S. Shyu, TL Chia, “Incrementing visual cryptography using random grids,”. Opt. Commun 283, 4242–4249 (2010). |
[4] | T. Chen, K. Tsao, “Threshold visual secret sharing by random grids,”. J. Syst. Softw 84, 1197–1208 (2011). |
[5] | C. N. Yang, K.H. Yu, and R. Lukac, “User-friendly image sharing in multimedia database using polynomials with different primes,” LNCS 4352, pp. 443-452, MMM 2007. |
[6] | S. Yamasaki, K. Matsushima, "A compression scheme of secret sharing," Intelligent Signal Processing and Communications Systems (ISPACS), 2013 International Symposium on, vol., no., pp.351,356, 12-15 Nov. 2013 |
[7] | W.-P.Fang, “Secret image sharing safety,” Communications, 2008. APCC 2008. 14th Asia-Pacific Conference on , vol., no., pp.1-4, 14-16 Oct. 2008. |
[8] | http://provideocoalition.com/sony/story/twice. |
[9] | H. Koumaras, A. Kourtis, C.-H. Lin, and C.-K. Shieh, "A Theoretical Framework for End-to-End Video Quality Prediction of MPEG-based Sequences," Networking and Services, 2007. ICNS. Third International Conference on , vol., no., pp.62, 19-25 June 2007. |
[10] | Z. Chen, Z. Xion, and L. Tang, “A novel scrambling scheme for digital video encryption,” in Proc. of Pac i fic-Rim Symposium on Image and Video Technology(PSIVT), 2006, pp. 997-1006. |
[11] | Z. Liu, X. Li, and Z. Dong, “Enhancing security of frequency domain video encryption,” in Proc. of ACM Multimedia, 2004, pp. 304-307 2006, pp. 997-1006. |
[12] | T. Chen, K. Tsao, “Threshold visual secret sharing by random grids,”. J. Syst. Softw 84, 1197–1208 (2011). |
[13] | Link: www1.icsi.berkeley.edu/PET/petapplications.html |
[14] | Link:http://sipi.usc.edu/database/database.php?volume=misc |
[15] | R. Brinkman, J. M. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Workshop on Secure Data Management in a Connected World (SDM 2004), volume 3178 of Lecture Notes in Computer Science, pages 18–27. Springer-Verlag, 2004. |
[16] | L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,” in Proc. of ACM Multimedia, pp. 219–229. |
[17] | Sheng Cao, and Yong Chen, “Some secret sharing algorithms for Multimedia Security,” Computer Application and System Modeling (ICCASM), 2010 International Conference on , vol.13, no., pp.V13-526-V13-529, 22-24 Oct. 2010. |
[18] | W.W. Zhang*, Y.G. Wen, Z.Z. Chen and A. Khisti, “QoE-Driven Cache Management for HTTP Adaptive Bit Rate Streaming over Wireless Networks,” IEEE Transactions on Multimedia (TMM), Vol. 15, No. 6, October 2013, pp.1431-1445. |
[19] | W.W. Zhang*, Y.G. Wen, K. Guan, D. Kilper, H.Y. Luo and D.P. Wu, “Energy-Efficient Mobile Cloud Computing under Stochastic Wireless Channel,” IEEE Transactions on Wireless Communications (TWC), Vol. 12, No. 9, September 2013, pp. 4569-4581. |
[20] | Y.G. Wen, X.Q. Zhu, J.P.C. Rodrigues and C.W. Chen, “Mobile Cloud Media: Reflections and Outlook (invited paper),” IEEE Transactions on Multimedia (TMM), Vol. 16, No.4, June 2014, pp. 885-902. |
[21] | Kejie Lu, Yi Qian, Mohsen Guizani, and Hsiao-Hwa Chen, “A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol.7, No.2, pp.639-647, February 2008. |
[22] | Honggang Wang, Yi Qian, and Hamid Sharif, “Multimedia Communications over Cognitive Radio Networks for Smart Grid”, IEEE Wireless Communications, Vol.20, No.4, pp.125-132, August 2013. |
[23] | Liang Zhou, Rose Qingyang Hu, Yi Qian, and Hsiao-Hwa Chen, “Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks”, IEEE Journal on Selected Areas in Communications, Vol. 31, No. 5, pp.981-991, May 2013. |