Cryptography Reference
In-Depth Information
[12] Hofmeister T., Krause M. and Simon H. U. (2000). Contrast-optimal
k out of n secret sharing schemes in visual cryptography. Theoretical
Computer Science, 240, 471{485.
[13] Ito R., Kuwakado H., and Tanaka H. (1999). Image size invariant vi-
sual cryptography. IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, E82A(10), 2172-2177.
[14] Krause M. and Simon H. U. (2003). Determining the optimal contrast
for secret sharing schemes in visual cryptography. Combinatorics, Prob-
ability and Computing, 12, 285{299.
[15] Kuhlmann C. and Simon H. U. (2000). Construction of visual secret
sharing schemes with almost optimal contrast. Proceedings of the 11th
ACM-SIAM Symposium on Discrete Algorithms, San Francisco, USA,
9{11 January, pp. 262-272.
[16] Naor M. and Shamir A. (1994). Visual cryptography. Proceedings of
Eurocrypt 94, Perugia, Italy, May 9{12, pp. 1{12, Springer Verlag LNCS
950.
[17] Tuyls P., Hollmann H.D.L., van Lint J.H., and Tolhuizen L. (2005).
XOR-based visual cryptography schemes. Designs, Codes, and Cryptog-
raphy, 37, 169{186.
[18] Ulutas M., Nabiyev V.V. Ulutas G., and Shamir A. (2009). A PVSS
scheme based on Boolean operations with improved contrast. Proceed-
ings of International Conference on Network and Service Security, Paris,
2009, pp. 1{5.
[19] Verheul E. R. and van Tilborg H. C. A. (1997). Constructions and prop-
erties of k out of n visual secret: Sharing schemes. Designs, Codes, and
Cryptography, 11, 179{196.
[20] Wang D., Zhang L., Ma N., and Li X. (2006). Two secret sharing schemes
based on Boolean operations. Pattern Recognition 40(10), 2776{2785
[21] Wang D., Li X., Yi F. Daoshun Wang, Xiaobo Li, and Feng Yi. (2007).
Probabilistic (n, n) visual secret sharing scheme for grayscale images. In
Information Security and Cryptology, Lecture Notes in Computer Sci-
ence, Vol. 4990. Springer-Verlag, Berlin, pp.192{200
[22] Yang C.-N. (2004). New visual secret sharing schemes using probabilistic
method. Pattern Recognition Letters, 25, 481{494.
[23] Yang C.-N. and Chen T.-S. (2005). Size-adjustable visual secret sharing
schemes. IEEE Trans. Fundamentals, 88, 2471{2474.
 
Search WWH ::




Custom Search