Cryptography Reference
In-Depth Information
[27] T.W. Sederberg and F.L. Chen Implicitization using moving curves and
surfaces. In Proceedings of SIGGRAPH'95, pages 301{308, Los Angeles,
1995. ACM Press.
[28] T.W. Sederberg, T. Saito, D.X. Qi, and K.S. Klimaszewski. Curve im-
plicitization using moving lines.
Computer Aided Geometric Design,
(11):687{706, 1994.
[29] E.R. Verheul and H.C.A. Van Tilborg. Constructions and properties
of k out of n visual secret sharing schemes.
Des. Codes Cryptography,
11(2):179{196, 1997.
[30] J. Weir and W Yan. Resolution variant visual cryptography for street
view of Google maps. In IEEE International Symposium on Circuits and
Systems, 2010. ISCAS 2010, May 2010.
[31] J. Weir, W.Q. Yan, and D. Crookes. Secure mask for color image hiding.
In Third International Conference on Communications and Networking
in China, 2008. ChinaCom 2008, pages 1304{1307, Aug. 2008.
[32] C.-N. Yang and T.-S. Chen. New size-reduced visual secret sharing
schemes with half reduction of shadow size.
In ICCSA (1), pages 19{
28, 2005.
[33] C.-N. Yang and T.-S. Chen. Colored visual cryptography scheme based
on additive color mixing. Pattern Recognition, 41(10):3114{3129, 2008.
[34] C.-N. Yang and C.-S. Laih. New colored visual secret sharing schemes.
Designs, Codes and Cryptography, 20(3):325{336, 2000.
[35] Z. Zhou, G. R. Arce, and G. Di Crescenzo. Halftone visual cryptography.
IEEE Transactions on Image Processing, 15(8):2441{2453, 2006.
 
Search WWH ::




Custom Search