Visual Cryptography - Models, Issues, Applications and New Directions
暂无分享,去创建一个
[1] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..
[2] Ching-Nung Yang,et al. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion , 2005, Pattern Recognit. Lett..
[3] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[4] Paolo D'Arco,et al. Secure Two-Party Computation: A Visual Way , 2013, ICITS.
[5] Stelvio Cimato,et al. Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..
[6] Hans Ulrich Simon,et al. Construction of visual secret sharing schemes with almost optimal contrast , 2000, SODA '00.
[7] Xiaotian Wu,et al. Random grid-based visual secret sharing for general access structures with cheat-preventing ability , 2012, J. Syst. Softw..
[8] Alfredo De Santis,et al. Color visual cryptography schemes for black and white secret images , 2013, Theor. Comput. Sci..
[9] Alfredo De Santis,et al. Measure-independent characterization of contrast optimal visual cryptography schemes , 2013, J. Syst. Softw..
[10] Stelvio Cimato,et al. Visual cryptography schemes with optimal pixel expansion , 2006, Theor. Comput. Sci..
[11] D. Stinson. Visual cryptography and threshold schemes , 1999 .
[12] Somnath Sikdar,et al. A New (2, n)-Visual Threshold Scheme for Color Images , 2003, INDOCRYPT.
[13] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[14] Hans Ulrich Simon,et al. Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography , 2000, Combinatorics, Probability and Computing.
[15] Yvo Desmedt,et al. Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography , 2016, ICITS.
[16] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[17] Eli,et al. Visual Cryptography with Polarization , 1998 .
[18] Alfredo De Santis,et al. Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..
[19] Ching-Nung Yang,et al. Size-Adjustable Visual Secret Sharing Schemes , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[20] Ran-Zan Wang,et al. Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..
[21] Alfredo De Santis,et al. Extended Schemes for Visual Cryptography , 1995 .
[22] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[23] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[24] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[25] Tzung-Her Chen,et al. Yet Another Friendly Progressive Visual Secret Sharing Scheme , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[26] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[27] Alfredo De Santis,et al. On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..
[28] Alfredo De Santis,et al. Cheating Immune Threshold Visual Secret Sharing , 2010, Comput. J..
[29] Stelvio Cimato,et al. Colored visual cryptography without color darkening , 2004, Theor. Comput. Sci..
[30] Cheehang Park Park,et al. Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .
[31] Jen-Bang Feng,et al. Visual secret sharing for multiple secrets , 2008, Pattern Recognit..
[32] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[33] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[34] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[35] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[36] Annalisa De Bonis,et al. Randomness in secret sharing and visual cryptography schemes , 2004, Theor. Comput. Sci..
[37] Stelvio Cimato,et al. Optimal Colored Threshold Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[38] Wen-Guey Tzeng,et al. Compatible Ideal Contrast Visual Cryptography Schemes with Reversing , 2005, ISC.
[39] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[40] Andreas Klein,et al. Extended visual cryptography schemes , 2007, Inf. Comput..
[41] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[42] Oscar C. Au,et al. Visual Cryptography and Secret Image Sharing , 2011 .
[43] Feng Liu,et al. A new definition of the contrast of visual cryptography scheme , 2010, Inf. Process. Lett..
[44] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[45] Pei-Ling Chiu,et al. An Extended Visual Cryptography Algorithm for General Access Structures , 2012, IEEE Transactions on Information Forensics and Security.
[46] Vladimir Kolesnikov. Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation , 2005, ASIACRYPT.
[47] Hirosuke Yamamoto,et al. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images , 1998 .
[48] Douglas R. Stinson,et al. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..
[49] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[50] Chin-Chen Chang,et al. Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.
[51] Hans Ulrich Simon,et al. Contrast-optimal k out of n secret sharing schemes in visual cryptography , 1997, Theor. Comput. Sci..
[52] Ching-Nung Yang,et al. Visual Cryptography Schemes with Reversing , 2008, Comput. J..
[53] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[54] Feng Liu,et al. Optimal XOR Based (2, n)-Visual Cryptography Schemes , 2014, IWDW.
[55] Rafail Ostrovsky,et al. Visual cryptography on graphs , 2008, J. Comb. Optim..