|
[1]O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, Vol. 12, No. 6. pp. 377-379, 1987. [2]M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science, Vol. 950. pp. 1-12, Springer-Verlag, 1995. [3]C.N Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, Vol. 25, No. 4, pp. 481-494, 2004. [4]A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, Issue 11, pp. 612-613, NOV. 1979. [5]K.Y. Chen, W.P. Wu and C.S Laih, “On the (2,2) Visual Multi-Secret Sharing Schemes,” Proceedings of the 2000 International Computer Symposium Workshop on Cryptography and Information Security, Taiwan, pp. 73-80, DEC. 2000. [6]Pei-Fang Tsai and Ming-Shi Wang, “An (3,3)-Visual Secret Sharing Scheme for Hiding Three Secret Data,” Joint conference on information sciences, Taiwan, OCT. 2006. [7]Hsien-Chu Wu, Chin-Chen Chang, “Sharing visual multi-secrets using circle shares,” Computer Standards & Interfaces, Vol. 28, pp. 123-135, 2005. [8]Shyong-Jian Shyu, “Image encryption by random grids,” Pattern Recognition, Vol. 40, pp. 1014-1031, 2007. [9]Young-Chang Hou, “Visual cryptography for color images,” Pattern Recognition, Vol. 36, pp. 1619-1629, 2003. [10]C.S. Tsai, C.C. Chang, T.S. Chen, “Sharing multiple secrets in digital images,” Journal of Systems and Software, Vol. 64, pp. 163-170, 2002.
|