Encrypting More Information in Visual Cryptography Scheme
暂无分享,去创建一个
Peng Li | Feng Liu | Chuan Kun Wu | Chuankun Wu | Peng Li | Feng Liu
[1] Hiroki Koga. A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme , 2002, ASIACRYPT.
[2] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[3] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[4] P. Babu Anto,et al. Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.
[5] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[6] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[7] Feng Liu,et al. The alignment problem of visual cryptography schemes , 2009, Des. Codes Cryptogr..
[8] Ching-Nung Yang,et al. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..
[9] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[10] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[11] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[12] WeiQi Yan,et al. Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[13] Jeffrey Snyder,et al. Visual Cryptography and Secret Image Sharing , 2012, J. Electronic Imaging.
[14] H. Yamamoto,et al. Visual secret sharing schemes for plural secret images , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Ja-Chen Lin,et al. Visual cryptography with extra ability of hiding confidential data , 2006, J. Electronic Imaging.
[17] Stefan Droste,et al. New Results on Visual Cryptography , 1996, CRYPTO.
[18] Mitsugu Iwamoto,et al. Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[19] Ja-Chen Lin,et al. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..
[20] Shyong Jian Shyu,et al. Efficient visual secret sharing scheme for color images , 2006, Pattern Recognit..