Optimal XOR Based (2, n)-Visual Cryptography Schemes
暂无分享,去创建一个
[1] Hu Chuan-Gan,et al. On The Shift Register Sequences , 2004 .
[2] Ching-Nung Yang,et al. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..
[3] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[4] Alexander Vardy,et al. A table of upper bounds for binary codes , 2001, IEEE Trans. Inf. Theory.
[5] W. Z. Gandhare,et al. Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.
[6] Douglas R Stinson,et al. Contemporary design theory : a collection of surveys , 1992 .
[7] Stelvio Cimato,et al. Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..
[8] Marten van Dijk,et al. Visual Crypto Displays Enabling Secure Communications , 2003, SPC.
[9] Morris Plotkin,et al. Binary codes with specified minimum distance , 1960, IRE Trans. Inf. Theory.
[10] H. Kuwakado,et al. Size-Reduced Visual Secret Sharing Scheme( Discrete Mathematics and Its Applications) , 2004 .
[11] Feng Liu,et al. On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.
[12] Cheehang Park Park,et al. Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .
[13] Tzungher Chen,et al. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..
[14] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[15] Feng Liu,et al. Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..
[16] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[17] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[18] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[19] Young-Chang Hou,et al. Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .
[20] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[21] N. J. A. Sloane,et al. A new table of constant weight codes , 1990, IEEE Trans. Inf. Theory.
[22] Subramania Sudharsanan. Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.
[23] A. De Santis. On visual cryptography schemes , 1998, ITW 1998.
[24] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[25] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[26] Eli,et al. Visual Cryptography with Polarization , 1998 .
[27] Henk D. L. Hollmann,et al. A polarisation based Visual Crypto System and its Secret Sharing Schemes , 2002, IACR Cryptol. ePrint Arch..
[28] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[29] Lakhmi C. Jain,et al. Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..
[30] Feng Liu,et al. Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..
[31] L. W. Hawkes,et al. An Application of Visual Cryptography To Financial Documents , 2000 .
[32] Chin-Chen Chang,et al. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..
[33] Feng Liu,et al. Some Extensions on Threshold Visual Cryptography Schemes , 2010, Comput. J..
[34] Feng Liu,et al. Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners , 2011, IET Inf. Secur..
[35] Hidenori Kuwakado,et al. Visual Cryptographic Protocols Using the Trusted Initializer , 2005, ICICS.
[36] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[37] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[38] Stefan Droste,et al. New Results on Visual Cryptography , 1996, CRYPTO.
[39] Der-Chyuan Lou,et al. A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.