Cryptography Reference
In-Depth Information
[4] C. C. Chang, C. C. Lin, T. H. N. Le, and H. B. Le. A probabilistic
visual secret sharing scheme for grayscale images with voting strategy.
In Proceedings of the International Symposium on Electronic Commerce
and Security, pages 184{188, 2008.
[5] K. Y. Chao and J. C. Lin. Secret image sharing: A Boolean-operations-
based approach combining benefits of polynomial-based and fast ap-
proaches. International Journal of Pattern Recognition and Artificial
Intelligence, 23(2):263{285, 2009.
[6] S. Cimato, R. De Prisco, and A. De Santis. Probabilistic visual cryptog-
raphy schemes. Computer Journal, 49(1):97{107, 2006.
[7] S. Cimato, A. De Santis, A. L. Ferrara, and B. Masucci. Ideal contrast
visual cryptography schemes with reversing. Information Processing Let-
ters, 93(4):199{206, 2005.
[8] Y. Desmedt, S. Hou, and J. J. Quisquater. Audio and optical cryptog-
raphy. In ASIACRYPT '98, Lecture Notes in Computer Science, volume
1514, pages 392{404, 1998.
[9] S. Droste. New results on visual cryptography. In Advances in Cryptology-
CRYPTO '96, Lecture Notes in Computer Science, volume 1109, pages
401{415, 1996.
[10] C. M. Hu and W. G. Tzeng. Compatible ideal contrast visual cryptogra-
phy schemes with reversing. Information Security, 3650:300{313, 2005.
[11] R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryp-
tography. IEICE Trans. Fundamentals, E82-A(10):2172{2177, 1999.
[12] S. S. Lee, J. C. Na, S. W. Sohn, C. Park, D. H. Seo, and S. J. Kim. Visual
cryptography based on an interferometric encryption technique.
ETRI
Journal, 24(5):373{380, 2002.
[13] F. Liu, C. K. Wu, and X. J. Lin. Colour visual cryptography schemes.
IET Information Security, 2(4):151{165, 2008.
[14] F. Liu, C. K. Wu, and X. J. Lin. Some extensions on threshold visual
cryptography schemes. Computer Journal, 53:107{119, 2010.
[15] F. Liu, C. K. Wu, and X. J. Lin. Step construction of visual cryptography
schemes. In IEEE Transactions on Information Forensics and Security,
volume 5, pages 27{28, 2010.
[16] M. Naor and A. Shamir. Visual cryptography. In Visual Cryptography,
Proceedings of Eurocrypto' 94, Lecture Note in Computer Science, volume
950, pages 1{12, 1995.
 
Search WWH ::




Custom Search