|
1.M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptography: Eurocrypt’94, Springer, Berlin, pp. 1–12, 1995. 2.G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson, “Visual cryptography for general access structures,” Information and Computation, vol. 129, no. 2, pp. 86–106, 1996. 3.C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes,” Journal of Cryptology, vol. 12, pp. 261–289, 1999. 4.T. Hofmeister, M. Krause and H.U. Simon, “Contrast-optimal k out of n secret sharing schemes in visual cryptography,” Theoretical Computer Science, vol. 240, pp. 471–485, 2000. 5.C. Blundo, P.D. Arco, A. De Santis and D.R. Stinson, “Contrast optimal threshold visual cryptography schemes,” SIAM Journal on Discrete Mathematics, vol. 16, pp. 224–261, 2003. 6.D.Q. Viet and K. Kurosawa, “Almost ideal contrast visual cryptography with reversing,” Lecture Notes in Computer Science, vol. 2964, pp. 353–365, 2004. 7.S. Cimato, A. De Santis, A.L. Ferrara and B. Masucci, “Ideal contrast visual cryptography schemes with reversing,” Information Processing Letters, vol. 93, no. 4, pp. 199–206, 2005. 8.R. Ito, H. Kuwakado and H. Tanaka, “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, no.10, pp. 2172–2177, 1999. 9.C.N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, no. 4, pp. 481–494, 2004. 10.C.N. Yang and T.S. Chen, “Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,” Pattern Recognition Letters, vol. 26, pp. 193–206, 2005. 11.Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai and Y.P. Chu, “A multiple-level visual secret-sharing scheme without image size expansion,” Information Sciences, vol. 177, no. 21, pp. 4696–4710, 2007. 12.C.N. Yang and C.S. Laih, “New colored visual secret sharing schemes,” Designs, Codes and Cryptography, vol. 20, No. 3, pp. 325–335, 2000. 13.Y.C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol. 36, no. 7, pp. 1619–1629, 2003. 14.C.C. Lin and W.H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognition Letters, vol. 24, pp. 349–358, 2003. 15.S.J. Shyu, “Efficient visual secret sharing scheme for color images,” Pattern Recognition, vol. 39, no. 5, pp. 866–880, 2006. 16.C.N. Yang and T.S. Chen, “Colored visual cryptography scheme based on additive color mixing,” Pattern Recognition, vol. 41, no. 10, pp. 3114–3129, 2008. 17.H.C. Wu and C.C. Chang, “Sharing visual multi-secrets using circle shares,” Computer standards and Interfaces, vol. 28, no. 1, pp. 123–135, 2005. 18.S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang and K. Chen, “Sharing multiple secrets in visual cryptography,” Pattern Recognition, vol. 40, pp. 3633–3651, 2007. 19.J.B. Feng, H.C. Wu, C.S. Tsai, Y.F. Chang and Y.P. Chu, “Visual secret sharing for multiple secrets,” Pattern Recognition, vol. 41, no. 12, pp. 3572–3581, 2008. 20.R. Lukac and K. N. Plataniotis, “Bit-level based secret sharing for image encryption,” Pattern Recognition, vol. 38, no. 5, pp. 767–772, 2005. 21.M. Naor and B. Pinkas, “Visual Authentication and Identification,” Lecture Notes in Computer Science, vol. 1294, pp. 322–336, 1997. 22.D.C. Lou, H. K. Tso and J. L. Liu, “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards and Interfaces, vol. 29, no. 1, pp. 125–131, 2007. 23.O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, pp. 377–379, 1987. 24.S.J. Shyu, “Image encryption by random grids,” Pattern Recognition, vol. 40, no. 3, pp. 1014–1031, 2007. 25.S.J. Shyu, “Image encryption by multiple random grids,” Pattern Recognition, vol. 42, no. 7, pp. 1582–1596, 2009. 26.T.H. Chen, and K.H. Tsao, “Visual secret sharing by random grids revisited,” Pattern Recognition, vol. 42, no. 9, pp. 2203–2217, 2009. 27.R.Z. Wang, Y.K. Lee, S.Y. Huang and T.L. Chia, “Multilevel Visual Secret sharing,” The Second International Conference on Innovaive Computing, Information and Control, Kumamoto Japan, Sep. 2007.
|