Cryptography Reference
In-Depth Information
[24] R. Lukac and K.N. Plataniotis. Bit-level based secret sharing for image
encryption. Pattern Recognition, 38(5):767{772, 2005.
[25] E. Myodo, K. Takagi, S. Miyaji, and Y. Takishima. Halftone visual cryp-
tography embedding a natural grayscale image based on error diffusion
technique. In Intl. Conference on Multimedia and Expo, pages 2114{2117,
2007.
[26] E. Myodo, K. Takagi, and A. Yoneyama. Auto tone mapping method to
generate and decode high contrast halftone images in visual cryptography.
IEICE Technical Report, IE2009-53, 109(149):25{30, 2009. (in Japanese)
[27] D. Naccache. Colorful Cryptography|a purely physical secret shar-
ing scheme based on chromatic filters. In The French-Israeli Work-
shop on Coding and Information Integrity. Available at http://
www.gemplus.com/smart/rd/publications/ps/Nac94col.ps . 1994.
[28] M. Nakajima and Y. Yamaguchi. Extended visual cryptography for nat-
ural images. Journal of WSCG, 10(2):303{310, 2002.
[29] M. Nakajima and Y. Yamaguchi. Enhancing registration tolerance of
extended visual cryptography. Journal of Electronic Imaging, 13(3):654{
662, 2004.
[30] M. Nakajima and Y. Yamaguchi. Device-dependent color neutralization
method. In Color Imaging X, SPIE volume 5667, pages 581{588, 2005.
[31] M. Naor and A. Shamir. Visual cryptography. In Lecture Notes in Com-
puter Science 950 (Advances in Cryptology- EUROCRYPTf94), pages
1{12, 1994.
[32] M. Naor and A. Shamir. Visual cryptography II: Improving the contrast
via the cover base. In Lecture Notes in Computer Science 1189 (Security
Protocols), pages 197{202, 1997.
[33] K. Oka, Y. Nakamura, and K. Matsui. Embedding signature into a hard-
copy image using micro-patterns. IEICE Trans. on Information and Sys-
tems, J79-D-II(9):1624{1626, 1996. (in Japanese)
[34] K. Oka, Y. Nakamura, and K. Matsui. Embedding signature into a hard-
copy image of dithered image. IEICE Trans. on Information and Systems,
J80-D-II(3):820{823, 1997. (in Japanese)
[35] V. Rijmen and B. Preneel. Ecient colour visual encryption or \Shared
colors of Benetton." In The Rump Session of EUROCRYPTf96. Available
at http://www.iacr.org/conferences/ec96/rump/preneel.ps.gz ,
1996.
[36] S.J. Shyu. Ecient visual secret sharing scheme for color images. Pattern
Recognition, 39(5):866{880, 2006.
 
Search WWH ::




Custom Search