Cryptography Reference
In-Depth Information
Monien (Eds.), Automata, Languages and Programming: ICALP'96, Lec-
ture Notes in Computer Science, 1099, Springer, Berlin:416{428, 1996.
[6] Y.-C. Hou. Visual cryptography for color images. Pattern Recognition,
36:1619{1629, 2003.
[7] O. Kafri and E. Keren. Encryption of pictures and shapes by random
grids. Opt. Lett, 12:377{379, 1987.
[8] M. Naor and B. Pinkas. Visual authentication and identification. in: B.S.
Kaliski Jr. (Ed.), Advances in Cryptology: CRYPTO97, Lecture Notes in
Computer Science, 1294:322{336, 1997.
[9] M. Naor and A. Shamir. Visual cryptography. in: A. De Santis (Ed.),
Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Sci-
ence, 950:1{12, 1995.
[10] P.A. Eisen and D.R. Stinson. Threshold visual cryptography schemes
with specified whiteness levels of reconstructed pixels. Des. Codes Cryp-
togr., 25:15{61, 2002.
[11] S.J. Shyu. Ecient visual secret sharing scheme for color images. Pattern
Recognition, 39:866{880, 2006.
[12] S.J. Shyu.
Image encryption by random grids.
Pattern Recognition,
40:1014{1031, 2007.
[13] S.J. Shyu. Image encryption by multiple random grids. Pattern Recogni-
tion, 42:1582{1596, 2009.
[14] E.R. Verheul and H.C.A. Van Tilborg. Constructions and properties of
k out of n visual secret sharing schemes.
Designs Codes Cryptography,
11:179{196, 1997.
 
Search WWH ::




Custom Search