Cryptography Reference
In-Depth Information
Recognition Letters,
23
, 931941
2. Hwang, K.F. and Chang, C.C. (2004): Recent development of visual cryptog-
raphy. Intelligent Watermarking Techniques, World Scientific Publishing Com-
pany, Chapter 16, 459480
3. Blakley, G.R. (1979), Safeguarding cryptographic keys. Proceedings of the Na-
tional Computer Conference, New York,
48
, 313317
4. Naor, N. and Shamir, A. (1995): Visual cryptography. Advances in Cryptology-
Eurocrypt94, Lecture Notes in Computer Science, Springer-Verlag,
950
, 112
5. Wu, H.C. and Chang, C.C. (2005): Sharing visual multi-secrets using circle
shares. Computer Standards & Interfaces,
28
, 123135
6. Lin, C.C. and Tsai, W.H. (2003): Visual cryptography for gray-level images by
dithering techniques. Pattern Recognition Letters,
24
, 349358
7. Blundo, C., Bonis, A.D. and Santis, A.D. (2001): Improved schemes for visual
cryptography. Designs, Codes, and Cryptography,
24
, 255278
8. Viet, D.Q. and Kurosawa, K. (2004): Almost ideal contrast visual cryptography
with reversing. Visual Cryptography II: Improving the Contrast Via the Cover
Base, Lecture Notes in Computer Science, Springer-Verlag,
2964
, 353365
9. Verheul, E.R. and Tilborg, H.C.A. (1997): Constructions and properties of k
out of n visual secret sharing schemes. Designs, Codes, and Cryptography,
11
,
179196
10. Lukac, R. and Plataniotis, K.N. (2005): Bit-level based Secret sharing for image
encryption. Pattern Recognition,
38
, 767772
11. Droste, S. (1996): New Results on visual cryptography. Advances in Cryptology-
Eurocrypt96, Lecture Notes in Computer Science, Springer-Verlag,
1109
, 401
415