Cheating Prevention in Improved Extended Progressive Visual Cryptography Scheme
暂无分享,去创建一个
[1] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Pei-Ling Chiu,et al. An XOR-based progressive visual cryptography with meaningful shares , 2016, 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI).
[4] S. B. Bhagate,et al. Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes , 2018 .
[5] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[6] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[7] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[8] Gwoboa Horng,et al. Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.
[9] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[10] Young-Chang Hou,et al. Progressive Visual Cryptography With Unexpanded Shares , 2011, IEEE Transactions on Circuits and Systems for Video Technology.