Steganography Based Visual Cryptography (SBVC)
暂无分享,去创建一个
[1] Alaa H. Alhamami,et al. A New Approach for Authentication Technique , 2005 .
[2] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[3] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Chi-Sung Laih,et al. Generating visible RSA public keys for PKI , 2003, International Journal of Information Security.
[6] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[7] V. Sridhar,et al. Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[8] Gwoboa Horng,et al. A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..
[9] Wanhua Cao,et al. Visual Cryptography for General Access Structure by Multi-pixel Encoding with Variable Block Size , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[12] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[13] Regunathan Radhakrishnan,et al. Data Masking: A New Approach for Steganography? , 2005, J. VLSI Signal Process..
[14] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.