|
[1] R. Anderson, "Why Cryptosystems Fail," Communications of the ACM, vol. 37, no. 11, 1994, pp. 32-40. [2] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Constructions and Bounds for Visual Cryptography," Lecture Notes in Computer Science, vol. 1099, 1996, pp. 416-428. [3] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual Cryptography for General Access Structures," Information and Computation, vol. 129, 1996, pp. 86-106. [4] G. R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of the National Computer Conference, vol. 48, 1979, pp. 313-317. [5] C. Blundo, S. Cimato, and A. De Santis, "Visual Cryptography Schemes with Optimal Pixel Expansion," Theoretical Computer Science, vol. 369, 2006, pp. 169-182. [6] C. Blundo, P. D''Arco, A. De Santis, and D. R. Stinson, "Contrast Optimal Threshold Visual Cryptography Schemes," SIAM Journal on Discrete Mathematics, vol. 16, 2003, pp. 224-261. [7] C. Blundo and A. De Santis, "Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels," Computers and Graphics, vol. 22, 1998, pp. 449-455. [8] C. Blundo, A. De Santis, and D. R. Stinson, "On the Contrast in Visual Cryptography Schemes," Journal of Cryptology, vol. 12, 1999, pp. 261-289. [9] C. Blundo, A. De Bonis, and A. De Santis, "Improved Schemes for Visual Cryptography," Designs, Codes and Cryptography, vol. 24, 2001, pp. 255-278. [10] Bongo, available at http://www.captcha.net/captchas/bongo/, The CAPTCHA Project, 2002. [11] M. Bose and R. Mukerjee, "Optimal (k, n) Visual Cryptographic Schemes for General k," Designs, Codes and Cryptography, vol. 55, 2010, pp. 19-35. [12] S. Cimato, R. De Prisco, and A. De Santis, "Optimal Colored Threshold Visual Cryptography Schemes," Designs, Codes and Cryptography, vol. 35, 2005, pp. 311-335. [13] S. Cimato1, R. De Prisco, and A. De Santis, "Probabilistic Visual Cryptography Schemes," The Computer Journal, vol. 49, 2006, pp. 97-107. [14] A. L. Coates, H. S. Baird, and R. J. Fateman, "Pessimal Print: A Reverse Turing Test," In Proceedings of the 6th International Conference on Document Analysis and Recognition, 2001, pp. 1154-1158. [15] R. Dhamija and A. Perrig, "D?j? vu: A user study using images for authentication," In Proceedings of the 9th USENIX Security Symposium, 2000, pp. 45-58. [16] D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, 1983, pp. 198-208. [17] S. Droste, "New Results on Visual Cryptography," Advances in Cryptography-CRYPTO''96, Lecture Notes in Computer Science, vol. 1109, 1996, pp. 401-415. [18] P. Dunphy, J. Nicholson, and P. Olivier, "Securing PassFaces for Description," Symposium on Usable Privacy and Security, ACM International Conference Proceedings, vol. 337, 2008, pp. 24-35. [19] P. A. Eisen and D. R. Stinson, "Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels," Designs, Codes and Cryptography, vol. 25, 2002, pp. 15-61. [20] Gimpy, available at http://www.captcha.net/captchas/gimpy/, The CAPTCHA Project, 2002. [21] T. Hofmeister, M. Krause, and H. U. Simon, "Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography," Theoretical Computer Science, vol. 240, 2000, pp. 471-485. [22] Y. C. Hou, "Visual cryptography for color images," Pattern Recognition, vol. 36, 2003, pp. 1619-1629. [23] C. S. Hsu and Y. C. Hou, "Goal-programming-assisted Visual Cryptography Method with Unexpanded Shadow Images for General Access Structures," Optical Engineering, vol. 45, 2006, pp. 097001-1-10. [24] The HumanAUT (Human AUThentication) Cryptographic Project, available at http://www.aladdin.cs.cmu.edu/reu/mini_probes/2003/humanaut.html, The Carnegie Mellon University, 2004. [25] R. Ito, H. Kuwakado, and H. Tanaka, "Image Size Invariant Visual Cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, vol. E82-A, 1999, pp. 2172-2177. [26] B. Javidi and T. Nomura, "Securing information by use of digital holography," Optics Letters, vol. 25, 2000, pp. 28-30. [27] T. Katoh and H. Imai, "An Extended Construction Method for Visual Secret Sharing Schemes," Electronics and Communications in Japan (Part III: Fundamental Electronic Science), vol. 81, 1998, pp. 55-63. [28] T. Katoh and H. Imai, "An Extended Construction Method of Visual Secret Sharing Scheme," IEICE Transactions on Fundamentals of Electronics, vol. J79-A, no. 8, 1996, pp. 1344-1351. [29] T. Katoh and H. Imai, "Some Visual Secret Sharing Schemes and Their Share Size," Joint Conference of International Computer Symposium, 1996, pp. 41-47. [30] K. Kobara and H. Imai, "Limiting the visible space visual secret sharing schemes and their application to human identification," Lecture Notes In Computer Science, Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology, vol. 1163, 1996, pp. 185-195. [31] S. Man, D. Hong, and M. Matthews, "A shoulder-surfing resistant graphical password scheme - WIW," International Conference on Security and Management, 2003, pp. 105-111. [32] O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Optics Letters, vol. 27, 2002, pp. 321-323. [33] X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Applied Optics, vol. 45, 2006, pp. 3289-3297. [34] P. C. Mogensen and J. Gluckstad, "Phase-only optical decryption of a fixed mask," Applied Optics, vol. 40, 2001, pp. 1226-1235. [35] P. C. Mogensen and J. Gluckstad, "Phase-only optical encryption," Optics Letters, vol. 25, 2000, pp. 566-568. [36] G. Mori and J. Malik, "Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA ," IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, 2003, pp. 134-141. [37] M. Naor, "Verification of a Human in The Loop or Identification via the Turing Test," unpublished, 1996, available at http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.6383. [38] M. Naor and A. Shamir, "Visual Cryptography," in: A. De Santis (Ed.), Advances in Cryptology: Eurpocrypt''94, Lecture Notes in Computer Science, vol. 950, Springer, Berlin, 1995, pp. 1-12. [39] T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Optical Engineering, vol. 39, 2000, pp. 2031-2035. [40] Pix, Available at http://www.captcha.net/captchas/pix/, The CAPTCHA Project, 2002. [41] P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Optics Letters, vol. 20, 1995, pp. 767-769. [42] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126. [43] A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, 1979, pp. 612-613. [44] S. J. Shyu, "Efficient visual secret sharing scheme for color images," Pattern Recognition, vol. 39, 2006, pp. 866-880. [45] S. J. Shyu and M. C. Chen, "The Optimized Pixel Expansion and Basis Matrices in (k, n)-VCS by Integer Linear Program," technical report, 2010, available at http://www.csie.mcu.edu.tw/~sjshyu/tvcs_lp/tvcs_lp.html. [46] S. J. Shyu and M. C. Chen, "The Optimized Pixel Expansion and Basis Matrices in VCS for General Access Structures by Integer Linear Program," technical report, 2010, available at http://www.csie.mcu.edu.tw/~sjshyu/vcsgas_lp/vcsgas_lp.html. [47] G. J. Simmons, W. A. Jackson, and K. M. Martin, "The Geometry of Shared Secret Schemes," Bulletin of the Institute of Combinatorics and its Applications, 1991, pp. 71-88. [48] V. Sorensen, "PassPic (formerly ADS Security Wizared) - Visual password management," Available at http://www.authord.com/products/PassPic/. [49] W. Stallings, "Cryptography and Network Security: Principles and Practice," Prentice Hall, 2006. [50] W. G. Tzeng and C. M. Hu, "A New Approach for Visual Cryptography," Designs, Codes and Cryptography, vol. 27, 2002, pp. 207-227. [51] G. Unnikrishnan, M. Pohit, and K. Singh, "A polarization encoded optical encryption system using ferroelectric spatial light modulator," Optics Communications, vol. 185, 2000, pp. 25-31. [52] E. R. Verheul and H. C. A. Van Tilborg, "Constructions and Properties of k out of n Visual Secret Sharing Schemes," Designs, Codes and Cryptography, vol. 11, 1997, pp. 179-196. [53] L. von Ahn, M. Blum, and J. Langford, "Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers Do AI," technical report, The CAPTCHA Project, Available at http://www.captcha.net/, 2002. [54] C. H. Wang, T. Hwang, and J. J. Tsai, "On the Matsumoto and Imai''s Human Identification Scheme," Advances in Cryptology-EUROCRYPT''95, Lecture Notes in Computer Science, vol. 921, 1995, pp. 382-392. [55] R. K. Wang, I. A. Watson, and C. R. Chatwin, "Random phase encoding for optical security," Optical Engineering, vol. 35, 1996, pp. 2464-2469. [56] H. Yamamoto and Y. Hayasaki, "Secure display that limits the viewing space by use of optically decodable encryption," Proceedings of SPIE, vol. 6482, 2007, pp. 64820C-1-10. [57] H. Yamamoto, Y. Hayasaki, and N. Nishida, "Securing display of grayscale and multicolored images by use of visual cryptography," Proceedings of SPIE, vol. 5306, 2004, pp. 716-724. [58] H. Yamamoto, Y. Hayasaki, and N. Nishida, "Secure information display by use of multiple decoding masks," Proceedings of SPIE, vol. 5600, 2004, pp. 192-199. [59] H. Yamamoto, Y. Hayasaki, and N. Nishida, "Securing information display by use of visual cryptography," Optics Letters, vol. 28, 2003, pp. 1564-1566. [60] H. Yamamoto, Y. Hayasaki, and N. Nishida, "Secure Information Display with Limited Viewing Zone by Use of Multi-Color Visual Cryptography," Optics Express, vol. 12, 2004, pp. 1258-1270. [61] H. Yamamoto, Y. Hayasaki, and N. Nishida, "Secure Information Display with Two Limited Viewing Zones Using Two Decoding Masks Based on Visual Secret Sharing Scheme," Japanese Journal of Applied Physics, Part 2. Letters, vol. 44, 2005, pp. 1803-1807. [62] C. N. Yang, "New Visual Secret Sharing Schemes Using Probabilistic Method," Pattern Recognition Letters, vol. 25, 2004, pp. 481-494. [63] Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, "A New Optical Random Coding Technique for Security Systems," Optics Communications, vol. 180, 2000, pp. 15-20.
|