|
[1]X.Yan, S. Wang, X. Niu, and C.N. Yang, “Generalized random grids-based threshold visual cryptography with meaningful shares,” Signal Processing, vol.109, pp.317-333, 2015. [2]X. Yan, S. Wang, X. Niu, and C.N Yang, “Random grid-based visual secret sharing with multiple decryptions,” Journal of Visual Communication and Image Representation, vol.26, pp.94-104, 2015. [3]M.E Hodeish, L. Bukauskas, and V.T. Humbe, “An Optimal (k,n)Visual Secret Sharing Scheme for Information Security,” Procedia Computer Science, vol.93, pp.760-767, 2016. [4]P.Y. Lin, R.Z. Wang, Y.J. Chang, and W.P. Fang, “Prevention of cheating in visual cryptography by using coherent patterns,” Information Sciences, vol.301, pp.61-74, 2015. [5]X. Yan, X. Liu, and C.N. Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of Real-Time Image Processing, vol.10, pp.1-13, 2015. [6]T.H. Chen and K.H. Tsao, “Threshold visual secret sharing by random grids,” Journal of Systems and Software, vol.84, pp.1197-1208, 2011. [7]O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol.12, pp.377-379, 1987. [8]T. Guo, F. Liu, and C. Wu, “Threshold visual secret sharing by random grids with improved contrast,” Journal of Systems and Software, vol.86, pp.2094-2109, 2013. [9]X. Wu and W. Sun, “Improving the visual quality of random grid-based visual secret sharing,” Signal Processing, vol.93, pp.977-995, 2013. [10]C.H Lin, Y.S. Lee, and T.H. Chen, “Friendly progressive random-grid-based visual secret sharing with adaptive contrast,” Journal of Visual Communication and Image Representation, vol.33, pp.31-41, 2015. [11]X. Yan, S. Wang, X. Niu, and C.N. Yang, “Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality,” Digital Signal Processing, vol.38, pp.53-65, 2015. [12]K.H. Tsao, S.J. Shyu, C.H. Lin, Y.H. Lee, and T.H. Chen, “Visual multiple-secret sharing for flexible general access structure by random grids,” Displays, vol.39, pp. 80-92, 2015. [13]X. Wu and W. Sun, “Improved tagged visual cryptography by random grids,” Signal Processing, vol.97, pp.64-82, 2014. [14]S. Shyu, “Image encryption by random grids,” Pattern Recognition, vol.40, pp.1014-1031, 2007. [15]K.S. Lin, C.H. Lin, and T.H. Chen, “Distortionless visual multi-secret sharing based on random grid,” Information Sciences, vol.288, pp.330-346, 2014. [16]D. Ou, W. Sun, and X. Wu, “Non-expansible XOR-based visual cryptography scheme with meaningful shares,” Signal Processing, vol.108, pp.604-621, 2015. [17]J.S. Lee, C.C. Chang, N.T. Huynh, and H.Y. Tsai, “Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique,” Digital Signal Processing, vol.40, pp.131-139, 2015. [18]X. Liu, S. Wang, J. Sang, and W.Zhang, “A novel mapping-based lossless Recovery algorithm for VSS,” Journal of Real-Time Image Processing, vol.10, pp.554-564, 2016. [19]T.H. Chen, Y.S Lee, and C.H. Lin, “On the difficulty of aligning VSS random grids,” Signal Processing: Image Communication, vol.44, pp.101-107, 2016. [20]M. Naor and A. Shamir , “Visual cryptography,” Lecture Notes in Computer Science , vol.950 , pp.1-12, 1995. [21]C.N. Yang, A.G. Peng, and T.S. Chen, “MTVSS: misalignment tolerant visual secret sharing on resolving alignment difficulty,” Signal Processing, vol.89, pp.1602–1624, 2009. [22]Y.C. Chen, D.S. Tsai, and G. Horng, “a new authentication based cheating preventing scheme in Naor-Shamir’s visual cryptography,” Journal of Visual Communication and Image Representation, vol.23, pp.1225-1233, 2012. [23]Y.C. Chen, D.S. Tsai, and G. Horng, “visual secret sharing with cheating prevention revisited,” Digital Signal Processing, vol.23, pp.1496-1504, 2013. [24]Y.C. Chen, G.B. Horng, and D.S. Tsai, “Cheating Prevention in Visual Cryptography,” IEEE transaction on image processing, vol.21, pp.3319-3323, 2012. [25]C.H. Yang, C.H. Chen, and S.R. Cai, “Enhanced Boolean-based multi secret image sharing scheme,” Journal of System and Software, vol.116, pp.22-34, 2016. [26]C.H. Lin, T.H. Chen, Y.T. Wu, K.H. Tsao, and K.S. Lin, “Multi-factor cheating prevention in visual secret sharing by hybrid codebooks,” Journal of Visual Communication Image Representation, vol.25, pp.1543-1557, 2014. [27]C.N. Yang, L.Z. Sun, and S.R. Cai, “Extended color visual cryptography for black and white secret image,” Theoretical Computer Science, vol.609, pp.143-161, 2016. [28]T.H. Chen, Y.S. Lee, W.L. Huang, J.S.T. Juan, Y.Y. Chen, and M.J. Li, “Quality-adaptive visual secret sharing by random grids,” The Journal of Systems and Software, vol.86, pp.1267-1274, 2013. [29]C.N. Yang, T.C. Tung, F.H. Wu, and Z. Zhou, “Color transfer visual cryptography with perfect security,” Measurement, vol.95, pp.480-493, 2017. [30]T.H. Chen and K.C. Li, “Multi-image encryption by circular random grids,” Information Sciences, vol.189, pp.255-265, 2012. [31]C.C. Wu and L.H. Chen, “A study on visual cryptography,” Institute of Computer and Information Science, Taiwan, 1998. [32]Y.C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol.36, pp.1619-1629, 2003. [33]Y.C. Hou, Z.Y. Quan, and C.F. Tsai, “a privilege-based visual secret sharing model,” Journal of Visual Communication and Image Representation, vol.33, pp.358-367, 2015. [34]H.C. Wu, H.C. Wang, and R.W. Yu, “color visual cryptography scheme using meaningful shares,” Eighth International Conference on Intelligent Systems Design and Applications, Taiwan, 2008. [35]C.N Yang, J.K. Liao, and D.S. Wang, “New privilege-based visual cryptographu with arbitrary privilege levels,” Journal of Visual Communication and Image Representation, vol.42, pp.121-131, 2017. [36]P. Chouksey and R. Rai, “Secret sharing based visual cryptography scheme for color preservation using RGB color space,” International Journal of Computer Science and Information Technology & Security, vol.5, pp.346-353, 2015. [37]X.Wu and W. Sun, “Extended Capabilities for xor-Based Visual Cryptography,” IEEE Transactions on Information Forensics and Security, vol.9, pp.1595-1605, 2014.
|