|
[1] C. Blundo and A. Santis, Visual cryptography schemes with perfect recon- struction of black pixels, Computer, No. 22, pp. 449445, 1998. [2] C. Blundo, A. Santis, and A. Bonis, Improved schemes for visual cryptog- raphy, Designs, Codes and Cryptograph, No. 24, pp. 225278, 2001. [3] J. J.-Y. Chang and J. S.-T. Juan, Multi-vss scheme by shifting random grids, In Proc. World Academy of Science, Engineering and Technology, No. 65, pp. 12771283, 2012. [4] T.-H. Chen, K.-H. Tsao, and K.-C.Wei, Multiple-image encryption by rotat- ing random grids, In Proc. of Eighth International Conference on Intelligent Systems Design and Applications, ISDA'08, pp. 252256, 2008. [5] Y.-C. Chen, Multi-VSS scheme by shifting random grids. Master Thesis, National Chi Nan University, Taiwan, 2014. [6] O. Kafri and E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, Vol. 12, No. 6, pp. 377379, 1987. [7] K. Kobara and H. Imai, Limiting the visible space visual secret sharing schemes and their application to human identication, Advances in Cryp- tology, pp. 185195, 1996. [8] F. Liu, C. K. Wu, and X. J. Lin, The alignment problem of visual cryp- tography schemes, Designs, Codes and Cryptographys, No. 50, pp. 215227, 2009. [9] M. Nakajima and Y. Yamaguchi, Enhancing registration tolerance of ex- tended visual cryptography for natural images, Journal of Electronic Imag- ing, No. 13, pp. 654662, 2002. [10] M. Nakajima and Y. Yamaguchi, Extended visual cryptography for natural images, Journal of WSCG, No. 10, pp. 303310, 2002. [11] M. Naor and A. Shamir, Visual cryptography, Advances in Cryptol- ogyEUROCRYPT'94, pp. 112, 1995. [12] S. J. Shyu, Image encryption by random grids, Pattern Recognition, No. 40, pp. 10141031, 2007. [13] E. R. Verheul and H. C. V. Tilborg, Constructions and properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, No. 11, pp. 179196, 1997. [14] D. S. Wang, L. Dong, and X. Li, Towards shift tolerant visual secret sharing schemes, IEEE Transactions on Information Forensics and Security, No. 6, pp. 323337, 2011. [15] X. Yan, S. Wang, X. Niu, and C. N. Yang, Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality, Digital Signal Processing, No. 38, pp. 5365, 2015. [16] C. N. Yang, A. G. Peng, and T. S. Chen, Mtvss: Misalignment tolerant vi- sual secret sharing on resolving alignment diculty, Signal Process, No. 89, pp. 16021624, 2009.
|