|
References
[1]W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Transaction on information theory, vol. 22, pp. 644-654, 1976.
[2]J. Katz and Y. Lindell, "Introduction to Modern Cryptography."(Boca Raton : Chapman & Hall/CRC, 2008).
[3]H. S. Lin, "Cryptography and public policy," Journal of Government Information, vol. 25, pp. 135-148, 1998.
[4]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for dada hiding," IBM Systems Journal, vol. 35, pp. 313-336, 1996.
[5]C.K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, pp. 469-474, 2004.
[6]P. Mohan Kumar and K. L. Shunmuganathan, "A reversible high embedding capacity data hiding technique for hiding secret data in images," International Journal of Computer Science and Information Security, vol. 7, pp. 109-115, 2010.
[7]R.Z. Wang, C.F. Lin, and J.C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, pp. 671-683, 2001.
[8]M. Wu and B. Liu, "Data Hiding in Binary Image for Authentication and Annotation," IEEE Transaction on Multimedia, vol. 6, pp. 528-538, 2004.
[9]J. Ruanaidh, H. Petersen, A. Herrigel, S. Pereira, and T. Pun, "Cryptographic copyright protection for digital images based on watermarking techniques," Theoretical Computer Science, vol. 226, pp. 117-142, 1999.
[10]W.H. Lin, Y.R. Wang, S.J. Horng, T.W. Kao, and Y. Pan, "A blind watermarking method using maximum wavelet coefficient quantization," Expert Systems with Applications, vol. 36, pp. 11509-11516, 2009.
[11]C.C. Yang, T.Y. Chang, and M.S. Hwang, "A (t, n) multi-secret sharing scheme," Applied Mathematics and Computation, vol. 151, pp. 483-490, 2004.
[12]C. C. Chang, C. C. Lin, T. H. N. Le, and H. B. Le, "Self-verifying visual secret sharing using error diffusion and interpolation techniques " IEEE Transaction on information forensics and security, vol. 4, pp. 790-801, 2009.
[13]R. Zhao, J.J. Zhao, F. Dai, and F.Q. Zhao, "A new image secret sharing scheme to identify cheaters," Computer Standards & Interfaces, vol. 31, pp. 252-257, 2009.
[14]C.C. Thien and J.C. Lin, "Secret image sharing," Computers & Graphics, vol. 26, pp. 765-770, 2002.
[15]Y.S. Wu, C.C. Thien, and J. C. J.C. Lin, "Sharing and hiding secret images with size constraint," Pattern Recognition, vol. 37, pp. 1377-1385, 2004.
[16]J. Yuan and C. Ding, "Secret Sharing Schemes from Two-Weight Codes," Electronic Notes in Discrete Mathematics, vol. 15, pp. 232-232, 2003.
[17]G. R. Blakely, "Safeguarding Cryptography Keys," Proceedings of the National Computer Conference vol. 48, pp. 313-317, 1979.
[18]A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
[19]M. Naor and A. Shamir, "Visual cryptography " in: A. De Santis (ED.), Advances in Cryptology: Eurprocrypt'94, Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1995.
[20]C. C. Wu and L. H. Chen, "A study on visual cryptography," Master Thesis, Institute of Computer and Information Science, National Chaio Tung University, Taiwan, R.O.C 1998.
[21]H.C. Wu and C.C. Chang, "Sharing visual multi-secrets using circle shares," Computer Standards & Interfaces, vol. 28, pp. 123-135, 2005.
[22]S. J. Shyu, S. Y. Huang, Y. K. Lee, R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual cryptography," Pattern Recognition, vol. 40, pp. 3633-3651, 2007.
[23]J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu, "Visual secret sharing for multiple secrets," Pattern Recognition, vol. 41, pp. 3572-3581, 2008.
[24]S. Cimato, R. D. Prisco, and A. D. Santis, "Probabilistic visual cryptography schemes," The Computer Journal, vol. 49(1), pp. 481-494, 2006.
[25]C.N. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol. 25, pp. 481-494, 2004.
[26]O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, vol. 12,no. 6, pp. 377-379, 1987.
[27]A. Klein and M. Wessler, "Extended visual cryptography schemes," Information and Computation, vol. 205, pp. 716-732, 2007.
[28]Y.C. Hou, "Visual cryptography for color images," Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
[29]S. Cimato, R. De Prisco, and A. De Santis, "Colored visual cryptography without color darkening," Theoretical Computer Science, vol. 374, pp. 261-276, 2007.
[30]C. N. Yang and C. S. Laih, "New Colored Visual Secret Sharing Schemes," Design, Codes and Cryptography, vol. 20, pp. 325-336, 2004.
[31]C.N. Yang and T.S. Chen, "Colored visual cryptography scheme based on additive color mixing," Pattern Recognition, vol. 41, pp. 3114-3129, 2008.
[32]S. J. Shyu, "Efficient visual secret sharing scheme for color images," Pattern Recognition, vol. 39, pp. 866-880, 2006.
[33]C.C. Chang, C.C. Lin, T. H.N. Le, and H.B. Le, "A New Probabilistic Visual Secret Sharing Scheme for Color Images," vol. Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, 2008.
[34]T. H. Chen and J. C. Huang, "A novel user-participating authentication scheme," The Journal of System and Software, vol. 83, pp. 861-867, 2010.
[35]T.H. Chen, T.H. Hung, G. Horng, and C.M. Chang, "Multiple Watermarking based on Visual Secret Sharing " International Journal of Innovative Computing, Information and Control, vol. 4, no. 11, pp. 3005-3026, 2008.
[36]H. Luo, F.X. Yu, S.C. Chu, and Z.M. Lu, "Hiding Watermarks in Transparencies of Visual Cryptography," International Journal of Innovative Computing, Information and Control, vol. 5, no. 7, pp. 1875-1882, 2009.
[37]B. Surekha, G. Swamy, and K. S. Rao, "A Multiple Watermarking technique for Images based on Visual Cryptography," International Journal of Computer applications, vol. 1, pp. 78-82, 2010.
[38]A. Ross and A. A. Othman, "Visual Cryptography for Face Privacy," Proc. of SPIE Conference on Biometric Technology for Human Identification VII, pp. 1-13, 2010.
[39]G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual Cryptography for General Access Structures," Information and Computation, vol. 129, pp. 86-106, 1996.
[40]E. R. Verheul and H. C. A. van Tilborg, "Constructions and Properties of k out of n Visual Secret Sharing Schemes " Designs, Codes and Cryptography, vol. 11, pp. 179-196, 1997.
[41]Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai, and Y.P. Chu, "A multiple-level visual secret-sharing scheme without image size expansion," Information Sciences, vol. 177, pp. 4696-4710, 2007.
[42]D. Wang, L. Zhang, N. Ma, and X. Li, "Two secret sharing schemes based on Boolean operations," Pattern Recognition, vol. 40, pp. 2776-2785, 2007.
[43]C.N. Yang and T.S. Chen, "New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size, " IEICE Trans. Fundamentals E89-A(2), pp. 620-625, 2006.
[44]M. Iwamoto and H. Yamamoto, "The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images," IEICE Trans. Fundamentals vol. E86-A,No. 10, pp. 2238-2247, 2003.
[45]T.H. Chen, K.H. Tsao, and K.C. Wei, "Multiple-Image Encryption by Rotating Random Grids," presented at Proceedings of The 8th International Conference on Intelligent System Design and Applications, Kaohsiung, Taiwan, Nov. 26-28, 2008.
[46]T.H. Chen and K.H. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognition, vol. 42, pp. 2203-2217, 2009
[47]R. Z. Wang, "Region Incrementing Visual Cryptography," IEEE Signal Processing Letters, vol. 16, pp. 659-662, 2009.
[48]T.H. Chen and J.C. Huang, "A Novel User-Participating Authentication Scheme," The Journal of Systems and Software, vol. 83, pp. 659-662, 2009.
|