Cryptography Reference
In-Depth Information
[17] P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, and L. Tolhuizen. Xor-based
visual cryptography schemes. Designs Codes and Cryptography, 37:169{
186, 2005.
[18] P. Tuyls, H.D.L. Hollmann, H.H.v. Lint, and L. Tolhuizen. A po-
larisation based visual crypto system and its secret sharing schemes.
http://eprint.iacr.org, 2002.
[19] M. Ulutas, V. V. Nabiyev, and G. Ulutas. A PVSS scheme based on
Boolean operations with improved contrast. In 2009 International Con-
ference on Network and Service Security, pages 1{5, 2009.
[20] E. R. Verheul and H. C. A. van Tilborg. Constructions and properties of
k-out-of-n visual secret sharing schemes. Designs, Codes and Cryptogra-
phy, 11:179{196, 1997.
[21] D. Q. Viet and K. Kurosawa. Almost ideal contrast visual cryptogra-
phy with reversing. In Proceeding of Topics in Cryptology-CT-RSA2004,
Lecture Notes in Computer Science, volume 2964, pages 353{365, 2004.
[22] D. S. Wang, X. Li, and F. Yi. Probabilistic (n,n) visual sharing scheme
for grayscale images. In SKLOIS Conference on Information Security and
Cryptology, Inscrypt 2007, Lecture Notes in Computer Science, volume
4990, pages 192{200, 2008.
[23] D. S. Wang, L. Zhang, N. Ma, and X. Li. Two secret sharing schemes
based on Boolean operations. Pattern Recognition, 40:2776{2785, 2007.
[24] C. N. Yang. New visual secret sharing schemes using probabilistic
method. Pattern Recognition Letters, 25:481{494, 2004.
[25] C. N. Yang, C. C. Wang, and T. S. Chen. Real perfect contrast visual
secret schemes with reversing. In Lecture Notes in Computer Science,
volume 3989, pages 433{447, 2006.
[26] C. N. Yang, C. C. Wang, and T. S. Chen. Visual cryptography schemes
with reversing. Computer Journal, 51(6):710{722, 2008.
 
Search WWH ::




Custom Search