New privilege-based visual cryptography with arbitrary privilege levels
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..
[3] Chih-Fong Tsai,et al. Block-based progressive visual secret sharing , 2013, Inf. Sci..
[4] Shyong Jian Shyu,et al. Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Xiaobo Li,et al. Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..
[6] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[7]
Ching-Nung Yang,et al.
[8] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[9] Ching-Nung Yang,et al. Constructions and Properties of General ( k, n ) Block-Based Progressive Visual Cryptography , 2015 .
[10] Ching-Nung Yang,et al. A discussion on the relationship between probabilistic visual cryptography and random grid , 2014, Inf. Sci..
[11] Ching-Nung Yang,et al. Essential Visual Cryptographic Scheme with Different Importance of Shares , 2014, ICONIP.
[12] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[13] Chih-Fong Tsai,et al. A privilege-based visual secret sharing model , 2015, J. Vis. Commun. Image Represent..
[14] Douglas R. Stinson,et al. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..
[15] Shyong Jian Shyu,et al. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.
[16] Ching-Nung Yang,et al. Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels , 2015, Inf. Sci..
[17] Feng Liu,et al. Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..
[18] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[19] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Stelvio Cimato,et al. Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..