|
[CIMA05] S. Cimato, A. De Santis, A.L. Ferrara, B. Masucci, Ideal contrast visual cryptography schemes with reversing, Information Processing Letters. 93 (2005) 199–206. [CIMA06] S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The Computer Journal. 49 (2006) 97–107. [EISE02] P.A. Eisen and D.R. Stinson, Threshold visual cyptography schemes with specified whiteness, Designs, Codes and Cryptography. 25 (2002) 15–61. [HOU13] Y.C. Hou, Z.Y. Quan, C.F. Tsai,A.Y. Tseng, Block-based progressive visual secret sharing, Information Sciences 233 (2013) 290–304. [HOU15] Y.C. Hou, Z.Y. Quan, C.F. Tsai, A privilege-based visual secret sharing model, J. Vis. Communication Image R. 33 (2015) 358–367. [ITO99] R. Ito, H. Kuwakado, H. Tanaka, Image size invariant visual cryptography, IEICE Trans. on Fund. of Elect. Comm. and Comp. Sci. E82-A (1999) 2172–2177. [LIU11] F. Liu, C. Wu, X.J. Lin, Cheating immune visual cryptography scheme, IET Information Security5 (2011) 51–59. [NAOR94] M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology-EUROCRYPT’ 94, LNCS 950, pp. 1-12, 1994. [SHIM79] A. Shamir, How to share a secret, Communication ACM. 22 (1979) 612–613. [SHYU12] S.J. Shyu, H.W. Jiang, Efficient construction for region incrementing visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology. 22 (2012) 769-777. [SHYU13] S.J. Shyu, H.W. Jiang, General constructions for threshold multiple-secret visual cryptography schemes, IEEE Transactions on Information Forensics Security 8 (2013) 733–743. [VERH97] E.R Verheul, H.C.A Van Tilborg, Constructions and properties of k out of n visual secret sharing scheme, Designs, Codes and Cryptography. 1 (1997) 179–196. [YAN14] X. Yan, S. Wang, X. Niu, C.N. Yang, Essential visual cryptographic scheme with different importance of shares, ICONIP 2014. LNCS 8836, pp. 636–643. [YANG04] C.N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters 25 (2004) 481–494. [YANG12] C.N. Yang, H.W. Shih, C.C. Wu, L. Harn, k out of n region incrementing scheme in visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology. 22 (2012) 779–810. [YANG14] C.N. Yang, D. Wang, Property analysis of XOR based visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology. 24 (2014) 189–197. [YANG15A] C.N. Yang and C.Y. Lin, Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels, Information Sciences. 312, (2015) 131–151. [YANG15B] C.N. Yang, C.C. Wu, Y.C. Lin, C. Kim, Constructions and properties of general (k, n) block-based progressive visual cryptography, ETRI Journal. 37 (2015) 979-989.
|