|
[1]M. Naor and A. Schamir, “Visual cryptography,” Advances in Cryptology-EUROCRYPT ’94, pp. 1 – 12, 1995. [2]C. Blundo, A. D. Santis, and M. Naor, “Visual cryptography for gray level images,” Proceedings of 2000 Conference on Computer Vision, Graphics and Image Processing, pp. I-221 -226, August 2000. [3]G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Electronic Colloquium on Computational Complexity (ECCC), vol 3, pp. 86 – 106, 1996. [4]C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, pp. 481 – 494, 2004. [5]W. Y. Chiu, G. Horng, C. L. Wang, and C. H. Shi, “Apply tiny populations genetic algorithm to visual cryptography,” 第十二屆全國資訊安全會議論文集, pp. 307-314, 2002. [6]Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” Image Processing International Conference, vol. 1, pp. I-521 -524, September 2003. [7]R. Ito, H. Kuwakado and H. Tanaka, “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, vol. E82-A, no. 10, pp. 2172-2177, October, 1999
|