参考文献/References:
[1]XIONG L,ZHONG X,YANG C. Transform domain-based invertible and lossless secret image sharing with authentication[J]. IEEE transactions on information forensics,2021,16:2912-2925.
[2]MASHHADI S,SAEEDI Z. A (t,n)-secret image sharing with steganography based on rook polynomial and LWE problem[J]. Multimedia tools and applications,2023,82(25):39077-39097.
[3]WU X,AN N,XU Z. Sharing multiple secrets in XOR-based visual cryptography by non-monotonic threshold property[J]. IEEE transactions on circuits and systems for video technology,2022,33(1):88-103.
[4]SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613.
[5]BLAKLEY G R. Safeguarding cryptographic keys[C]//Managing Requirements Knowledge,International Workshop On. New York,USA:IEEE Computer Society,1979:313.
[6]XIONG L,HAN X,ZHONG X,et al. RSIS:a secure and reliable secret image sharing system based on Extended Hamming Codes in industrial internet of things[J]. IEEE internet of things journal,2021,10(3):1933-1945.
[7]XIONG L,ZHONG X,XIONG N N,et al. QR-3S:a high payload QR code secret sharing system for industrial Internet of Things in 6G networks[J]. IEEE transactions on industrial informatics,2020,17(10):7213-7222.
[8]LI L L,HUANG P C,XIE R. QR Code secret sharing algorithm based on CRC[C]//2022 International Conference on Image Processing and Computer Vision. Okinawa,Japan:IEEE,2023:134-139.
[9]Information Technology:Automatic Identification and Data Capture Techniques:QR Code Bar Code Symbology Specification[M]. ISO/IEC 18004:2015. Geneva,Switzerland:ISO,2015.
[10]ZHANG L,SUN J,ZHANG X,et al. Two-level QR Code scheme based on region matrix image secret sharing algorithm[J]. Mathematical biosciences and engineering,2023,20(9):16678-16704.
[11]RAWAT A S,DESHMUKH M,SINGH M. QR shares based secret sharing scheme using DWT,random permutation and arithmetic modulo operation for QR secret[C]//2023 10th International Conference on Signal Processing and Integrated Networks. Noida,India:IEEE,2023:772-777.
[12]CHUANG J C,HU Y C,KO H J. A novel secret sharing technique using QR Code[J]. International journal of image processing,2010,4(5):468-475.
[13]CHOW Y W,SUSILO W,YANG G,et al. Exploiting the error correction mechanism in QR Codes for secret sharing[C]//Information Security and Privacy:21st Australasian Conference. Melbourne,VIC,Australia:Springer International Publishing,2016:409-425.
[14]CHENG Y,FU Z,YU B. Improved visual secret sharing scheme for QR Code applications[J]. IEEE transactions on information forensics and security,2018,13(9):2393-2403.
[15]LIN P Y. Distributed secret sharing approach with cheater prevention based on QR Code[J]. IEEE transactions on industrial informatics,2016,12(1):384-392.
[16]HUANG P C,CHANG C C,LI Y H. Sudoku-based secret sharing approach with cheater prevention using QR Code[J]. Multimedia tools and applications,2018,77:25275-25294.
[17]COX R. QArt codes[R/OL]. [2012-04-12]. http://research.swtch.com/qart.
[18]SAEIDI Z,YAZDI A,MASHHADI S,et al. High performance image steganography integrating IWT and Hamming Code within secret sharing[J]. IET image processing,2024,18(1):129-139.
[19]GOTTIMUKKALA A R,KUMAR N,DASH J K,et al. Image watermarking based on remainder value differencing and extended Hamming Code[J]. Journal of electronic imaging,2024,33(1):011003.
[20]MUNOZ-MEJIAS D,GONZALEZ-DIAZ I,DIAZ-DE-MARIA F. A low-complexity pre-processing system for restoring low-quality QR Code images[J]. IEEE transactions on consumer electronics,2011,57(3):1320-1328.