Cryptography Reference
In-Depth Information
[2] G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Extended capa-
bilities for visual cryptography. In ACM Theoretical Computer Science,
volume 250 Issue 1-2, pages 143{161, 2001.
[3] E. Biham and A. Itzkovitz. Visual cryptography with polarization. In the
Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP
Session of CRYPTO'98, 1997.
[4] S. Cimato, R. De Prisco, and A. De Santis. Probabilistic visual cryptog-
raphy schemes. In The Computer Journal, volume 49, Number 1, pages
97{107, 2006.
[5] S. Droste. New results on visual cryptography. In CRYPTO '96,
Springer-Verlag LNCS, volume 1109, pages 401{415, 1996.
[6] K. Kobara and H. Imai. Limiting the visible space visual secret sharing
schemes and their application to human identification. In ASIACRYPT
'96, Springer-Verlag LNCS, volume 1163, pages 185{195, 1996.
[7] H. Kuwakado and H. Tanaka. Size-reduced visual secret sharing scheme.
In IEICE Transactions on Fundamentals, volume E87-A, No. 5, pages
1193{1197, 2004.
[8] F. Liu, C.K. Wu, and X.J. Lin. The alignment problem of visual cryptog-
raphy schemes. In Designs, Codes and Cryptography, volume 50, pages
215{227, 2009.
[9] M. Nakajima and Y. Yamaguchi. Enhancing registration tolerance of
extended visual cryptography for natural images. In Journal of Electronic
Imaging, volume 13, pages 654{662, 2004.
[10] M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94,
Springer-Verlag Berlin, volume LNCS 950, pages 1{12, 1995.
[11] R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptog-
raphy. In IEICE Transactions on Fundamentals of Electronics, Commu-
nications and Computer Science, volume E82-A, No. 10, pages 2172{2177,
1999.
[12] S. J. Shyu.
Ecient visual secret sharing scheme for color images.
In
Pattern Recognition, volume 39, pages 866{880, 2006.
[13] W.Q. Yan, D. Jin, and M.S. Kankanhalli. Visual cryptography for print
and scan applications. In Proceedings of the 2004 International Sympo-
sium on Circuits and Systems, volume 5, pages 572{575, 2004.
[14] C.N. Yang. New visual secret sharing schemes using probabilistic method.
In Pattern Recognition Letters, volume 25, pages 481{494, 2004.
 
Search WWH ::




Custom Search