Cryptography Reference
In-Depth Information
[2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual
cryptography schemes. J. Cryptogr., 12:261{289, 1999.
[3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual
secret sharing for multiple secrets.
Pattern Recognition, 41:3572{3581,
2008.
[4] Y.-C. Hou. Visual cryptography for color images. Pattern Recognition,
36:1619{1629, 2003.
[5] C.-C. Lin and W.-H. Tsai. Visual cryptography for grey-level images by
dithering techniques. Pattern Recognition Lett., 24:349{358, 2003.
[6] M. Naor and B. Pinkas. Visual authentication and identification. in: B.S.
Kaliski Jr. (Ed.), Advances in Cryptology: CRYPTO97, Lecture Notes in
Computer Science, 1294:322{336, 1997.
[7] M. Naor and A. Shamir. Visual cryptography. in: A. De Santis (Ed.),
Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Sci-
ence, 950:1{12, 1995.
[8] S. J. Shyu, S.-Y. Huang, Y.-K. Lee, R.-Z. Wang, and K. Chen. Sharing
multiple secrets in visual cryptography.
Pattern Recognition, 40:3633{
3651, 2007.
[9] S.J. Shyu. Ecient visual secret sharing scheme for color images. Pattern
Recognition, 39:866{880, 2006.
[10] D.R. Stinson. An introduction to visual cryptography. Public Key Solu-
tion '97, pages 28{30, April 1997.
[11] E.R. Verheul and H.C.A. Van Tilborg. Constructions and properties of
k out of n visual secret sharing schemes.
Designs Codes Cryptography,
11:179{196, 1997.
[12] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis.
PhD thesis, Institute of Computer and Information Science, National
Chiao Tung University, Taiwan, R.O.C., 1998.
[13] H.-C. Wu and C.-C. Chang. Sharing visual multi-secrets using circle
shares. Comput. Stand. Interfaces, 134 (28):123{135, 2005.
 
Search WWH ::




Custom Search