Cryptography Reference
In-Depth Information
Recognition Letters, 23 , 931941
2. Hwang, K.F. and Chang, C.C. (2004): Recent development of visual cryptog-
raphy. Intelligent Watermarking Techniques, World Scientific Publishing Com-
pany, Chapter 16, 459480
3. Blakley, G.R. (1979), Safeguarding cryptographic keys. Proceedings of the Na-
tional Computer Conference, New York, 48 , 313317
4. Naor, N. and Shamir, A. (1995): Visual cryptography. Advances in Cryptology-
Eurocrypt94, Lecture Notes in Computer Science, Springer-Verlag, 950 , 112
5. Wu, H.C. and Chang, C.C. (2005): Sharing visual multi-secrets using circle
shares. Computer Standards & Interfaces, 28 , 123135
6. Lin, C.C. and Tsai, W.H. (2003): Visual cryptography for gray-level images by
dithering techniques. Pattern Recognition Letters, 24 , 349358
7. Blundo, C., Bonis, A.D. and Santis, A.D. (2001): Improved schemes for visual
cryptography. Designs, Codes, and Cryptography, 24 , 255278
8. Viet, D.Q. and Kurosawa, K. (2004): Almost ideal contrast visual cryptography
with reversing. Visual Cryptography II: Improving the Contrast Via the Cover
Base, Lecture Notes in Computer Science, Springer-Verlag, 2964 , 353365
9. Verheul, E.R. and Tilborg, H.C.A. (1997): Constructions and properties of k
out of n visual secret sharing schemes. Designs, Codes, and Cryptography, 11 ,
179196
10. Lukac, R. and Plataniotis, K.N. (2005): Bit-level based Secret sharing for image
encryption. Pattern Recognition, 38 , 767772
11. Droste, S. (1996): New Results on visual cryptography. Advances in Cryptology-
Eurocrypt96, Lecture Notes in Computer Science, Springer-Verlag, 1109 , 401
415
Search WWH ::




Custom Search