Cryptography Reference
In-Depth Information
2.
Color image sharing based on visual cryptography. If visual cryptog-
raphy could be implemented in color images, we could share color
images with visual cryptography. Since visual cryptography is per-
fectly secure, color image sharing based on visual cryptography will
be extremely robust.
Bibliography
[1] A. Salomaa. Public-Key cryptography. Springer, Berlin Heidelberg, 1990.
[2] A. Shamir.
How to share a secret.
Communications of the ACM,
22(11):612{613, 1979.
[3] C. Blundo, A. De Bonis, and A. De Santis. Improved schemes for visual
cryptography. Designs, Codes and Cryptography, 24(3):255{278, 2001.
[4] C. Liu. Introduction to combinatorial mathematics. McGraw-Hill, New
York, 1968.
[5] C.A. Asmuth and J. Bloom. A modular approach to key safeguarding.
IEEE Transactions on Information Theory, 29:208{210, 1983.
[6] C.-C. Chang, C.-C. Lin, C.-H. Lin, and Y.-H. Chen. A novel secret image
sharing scheme in color images using small shadow images. Information
Sciences, 178(11):2433{2447, 2008.
[7] S.-K. Chen and J.-C. Lin. Fault-tolerant and progressive transmission of
images. Pattern Recognition, 38(12):2466{2471, 2005.
[8] S.-C. Chuang, C.-H. Huang, and J.-L. Wu. Unseen visible watermarking.
In ICIP (3), pages 261{264, 2007.
[9] S. Cimato, R. De Prisco, and A. De Santis. Colored visual cryptography
without color darkening.
Theoretical Computer Science, 374(1-3):261{
276, 2007.
[10] S. Cimato, R. De Prisco, and A. De Santis. Optimal colored threshold vi-
sual cryptography schemes. Designs, Codes and Cryptography, 35(3):311{
335, 2005.
[11] D. Gollmann. Computer Security. John Wiley & Sons, Chichester, 1999.
[12] D.E. Denning. Cryptography and data security. Addison-Wesley, London,
1982.
 
 
Search WWH ::




Custom Search