A Secret Enriched Visual Cryptography
暂无分享,去创建一个
Peng Li | Feng Liu | Wei Qi Yan | Chuan Kun Wu | W. Yan | Chuankun Wu | Peng Li | Feng Liu
[1] Mohan S. Kankanhalli,et al. Progressive color visual cryptography , 2005, J. Electronic Imaging.
[2] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[3] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Shyong Jian Shyu,et al. Efficient visual secret sharing scheme for color images , 2006, Pattern Recognit..
[6] Feng Liu,et al. The alignment problem of visual cryptography schemes , 2009, Des. Codes Cryptogr..
[7] Ching-Nung Yang,et al. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..
[8] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[9] WeiQi Yan,et al. Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[10] Stefan Droste,et al. New Results on Visual Cryptography , 1996, CRYPTO.
[11] Mitsugu Iwamoto,et al. Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Ja-Chen Lin,et al. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..
[13] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[14] Stelvio Cimato,et al. Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision) , 2011 .
[15] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[16] H. Yamamoto,et al. Visual secret sharing schemes for plural secret images , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[17] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[18] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[19] Mohan S. Kankanhalli,et al. Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[20] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[21] Ja-Chen Lin,et al. Visual cryptography with extra ability of hiding confidential data , 2006, J. Electronic Imaging.
[22] Yun Q. Shi,et al. Transactions on Data Hiding and Multimedia Security III , 2008, Trans. Data Hiding and Multimedia Security.
[23] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[24] WeiQi Yan,et al. A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..
[25] Hiroki Koga. A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme , 2002, ASIACRYPT.
[26] P. Babu Anto,et al. Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.