A Verifiable Visual Cryptography Scheme
暂无分享,去创建一个
[1] Gwoboa Horng,et al. A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..
[2] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Chen Kefei. A Cheater Detectable Visual Cryptography Scheme , 2004 .
[6] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[7] Moni Naor,et al. Visual cryptography for grey level images , 2000, Inf. Process. Lett..
[8] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[9] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[10] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[11] Chuen-Ching Wang,et al. Repeating Image Watermarking Technique by the Visual Cryptography , 2000 .
[12] Jan Camenisch,et al. An efficient fair payment system , 1996, CCS '96.
[13] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[14] Mitsugu Iwamoto,et al. The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[16] Ching-Nung Yang,et al. Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast , 2007 .
[17] Chin-Chen Chang,et al. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..