Cryptography Reference
In-Depth Information
[6] C.C. Wang, S.C. Tai, and C.S. Yu. Repeating image watermarking tech-
nique by the visual cryptography, IEICE Transactions on Fundamentals,
Vol. E83-A (2000) 1589{1598.
[7] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson. Visual Cryptog-
raphy for general access structures, Information and Computation, (1996)
86{106.
[8] G. Horng, T. H. Chen, and D. S. Tsai. Cheating in visual cryptography,
designs, codes and cryptography, Vol. 38, No. 2 (2006) 219{236.
[9] M. Naor and A. Shamir. Visual cryptography, In Proceedings of Advances
in Cryptography-EUROCRYPTO'94, LNCS 950 (1994) 1{12.
[10] M. Naor and B. Pinkas. Visual authentication and identification, ad-
vances in cryptology - Proceedings of Crypto 97 (Burton S. Kaliski Jr.,
ed.), Lecture Notes in Computer Science, Springer-Verlag, New York,
1294 (1997) 322{336.
[11] R. Lukac and K.N. Plataniotis, Bit-level based secret sharing for image
encryption, Pattern Recognition Vol. 38(5) (2005) 767{772.
[12] V. Rijmen and B. Preneel, Ecient colour visual encryption for shared
colors of Benetton, EUROCRYPTO'96, Rump Session, Berlin, 1996.
[13] Y. C. Hou. Visual cryptography for color images, Pattern Recognition,
Vol. 36 (2003) 1619{1629.
[14] T. H. Chen and D. S. Tsai. Owner-customer right protection mecha-
nism using a watermarking scheme and a watermarking protocol, Pattern
Recognition, Vol. 39, Issue 8, (2006) pp. 1530{1541.
[15] C. Hu and W. Tzeng. Cheating prevention in visual cryptography, IEEE
Transactions on Image Processing, Vol. 16, No. 1, 2007, pp. 36{45.
[16] A. Shamir. How to share a secret, Comm. ACM, Vol. 22 (1979) 612{613.
[17] G. Blakley. Safeguarding cryptographic keys, Proc. AFIPS 1979 Natl.
Conf.
[18] D.S. Tsai, T.H. Chen, and G. Horng. A cheating prevention scheme
for binary visual cryptography with homogeneous secret images, Pattern
Recognition, Vol. 40 No. 8, 2007, pp. 2356{2366.
[19] R. C. Gonzalez and R. E. Woods. Digital Image Processing, 2nd Ed.,
Prentice-Hall, 2002.
[20] R. De Prisco and A. De Santis. Cheating immune threshold visual secret
sharing, The Computer Journal, doi:10.1093/comjnl/bxp068.
[21] C. Chang, T. Chen, and L. Liu. Preventing cheating in computational
visual cryptography, Fundamenta Informaticae Vol. 92 2009, pp. 27{42.
 
Search WWH ::




Custom Search