|
Reference
[1] M. Naor and A. Shamir, “Visual cryptography,” Adv. Cryptol.: EUROCRYPT, Lecture Notes Comput. Sci., Vol. 950, pp. 1–12, 1995. [2] Amalfi, Italy, “Visual cryptography II: Improving the contrast via the cover base,” in Security in Communication Networks, Lecture Notes in Computer Science. , Vol. 1189, pp. 197–202, 1996. [3] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R. “Visual cryptography for general access structures,” Information and Computation, Vol. 129, No. 2, pp. 86−106, 1996. [4] Chiang, S. C. and Yue, T. W., “Neural networks for visual cryptography – with examples for complex access schemes,” Proceedings of the ISCA 13th International Conference on Computer Applications in Industry and Engineering, pp. 281−286, November 2000. [5] Yue, T. W. and Chiang, S. C., “A neural-network approach for visual cryptography and authorization,” International Journal of Neural Systems, Vol. 14, No. 3, pp. 175−197, 2004. [6] Yue, T. W. and Chiang, S. C., “A neural-network approach for visual cryptography and authorization,” Proceedings of Design and Application of Hybridization of Intelligent Systems (HIS 2003), Melbourne, Australia, pp. 993−1002, December 2003. [7] Yue, T. W. and Chiang, S. C., “A neural network approach for visual cryptography,” Proceedings of the International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, Vol. 5, pp. 494−499, July 2000. [8] Yue, T. W. and Chiang, S. C., “A known-energy neural network approach for visual cryptography,” Proceedings of the International Joint Conference on Neural Networks (IJCNN 2001), Washington, DC, Vol. 4, pp. 2542−2547, July 2001. [9] Yue, T. W. and Chiang, S. C., “The general neural-network paradigm for visual cryptography,” Proceedings of the 6th International Work-Conference on Artificial and Natural Neural Networks (IWANN 2001), Lecture Notes in Computer Science 2084, Springer-Verlag, Granada, Spain, pp. 196−206, June 2001. [10] Stefan Droste, ”New Results on Visual Cryptography”. CRYPTO 96, Proc. of the 16th Annual International Cryptology Conference, Santa Barbara, CA, August 18-22, 1996, pp. 401-415, 1996. [11] Iwamoto, M. and Yamamoto, H., “The optimal n-out-of-n visual secret sharing scheme for gray-level images,” IEICE Trans. Fundamentals, Vol. E85-A, No. 10, pp. 2238−2247, 2002. [12] Blundo, C. and De Santis, A., “On the Contrast in Visual Cryptography Schemes”, Journal of Cryptography, Vol.12, pp. 261-289, 1998. [13] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography”, Designs, Codes and Cryptography, Vol. 24, Issue 3, pp. 255-278, 2001. [14] Eisen, P. A. and Stinson, D. R., “Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels,” Designs, Codes and Cryptography, Vol. 25, No. 1, pp. 15−61, 2002. [15] Verheul, E. R., and van Tilborg, H. C. A., “Constructions and properties of k out of n visual secret sharing schemes”, Designs, Codes and Cryptography, Vol. 11, No. 2, pp. 179−196, 1997. [16] Hou, Y. C., Chang, C. Y., and Hsu, C. S., “Visual cryptography for color images without pixel expansion,” Proceedings of the International Conference on Imaging Science, Systems, and Technology (CISST 2001), Las Vegas, Nevada, USA, Vol. 1, pp. 239−245, June 2001. [17] Ito, R., Kuwakado, H., and Tanaka, H., “Image size invariant visual cryptography,” IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 10, pp. 2172−2177, 1999. [18] Yang, C. N. and Chen, T. S., “Image size invariant visual secret sharing schemes for gray level image,” Proceedings of the 14th Information Security Conference, Taipei, Taiwan, pp. 464−471, June 2004. [19] Yang, C. N., “New visual secret sharing using probabilistic method,” Pattern Recognition Letters, Vol. 25, No. 4, pp. 481−494, 2004. [20] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., “Constructionsand bounds for visual cryptography,” Proceedings of the 23rd International Colloquiumon Automata, Languages and Programming (ICALP 1996), Lecture Notes in Computer Science 1099, pp. 416−428, 1996. [21] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., Extended Capabilities for Visual Cryptography, Theoretical Computer Science, Vol.250, Issue 1-2 (January 2001), pp. 143-161, 2001. [22] Hofmeister, T., Krause, M. and Simon, H. U., Contrast-optimal k out of n secret sharing schemes in visual cryptography, Theoretical Computer Science, 240, pp. 471-485, 2000. [23] Hou, Y. C., Chang, C. Y., and Tu, S. F., “Visual cryptography for color images based on halftone technology,” Proceedings of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, Vol. XIII, pp. 441−445, July 2001. [24] Hou, Y. C., Lin, F., and Chang, C. Y., “Visual cryptography for color images without pixel expansion,” Journal of Technology, Vol. 16, No. 4, pp. 595−603, 2001. [25] R. W. Floyed and L. Steinberg, “An adaptive algorithm for spatial gray scale,” J. Soc. Inform Display, Vol. 17, No. 2, pp. 75-77, 1976. [26] J. F. Jarvis and C. S. Roberts, “A new technique for displaying continuous tone images on a bi-level displzy,” IEEE Trans. Commun., Vol. 24, No. 8, pp. 891-898, 1976.
|