A Weighted Threshold Visual Cryptography
暂无分享,去创建一个
[1] W. -P. Fang,et al. Progressive viewing and sharing of sensitive images , 2006, Pattern Recognition and Image Analysis.
[2] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[5] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[6] Hans Ulrich Simon,et al. Contrast-optimal k out of n secret sharing schemes in visual cryptography , 2000, Theor. Comput. Sci..
[7] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[8] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[9] Ja-Chen Lin,et al. User-friendly sharing of images: progressive approach based on modulus operations , 2009, J. Electronic Imaging.
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[12] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[13] Tzung-Her Chen,et al. Yet Another Friendly Progressive Visual Secret Sharing Scheme , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[14] Ching-Nung Yang,et al. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion , 2005, Pattern Recognit. Lett..
[15] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[16] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[17] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..