References
- M. Naor and A. Shamir, "Visual cryptography," in Proc. of Workshop on the Theory and Application of of Cryptographic Techniques. vol.950, pp.1-12, 1994.
- O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, vol.12, no.6, pp.377-379, 1987. https://doi.org/10.1364/OL.12.000377
- G. Ateniese, C. Blundo, A. De Santis, and D. Stinson, "Visual cryptography for general access structures," Information and Computation, vol.129, no.2, pp.86-106, 1996. https://doi.org/10.1006/inco.1996.0076
- G. Shen, F. Liu, Z. Fu, and B. Yu, "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure," Multimedia Tools and Applications, vol.72, no.16, pp.14511-14533, 2017.
- Z. Fu and B. Yu, "Optimal pixel expansion of deterministic visual cryptography scheme," Multimedia Tools and Applications, vol.73, no.3, pp.1177-1193, 2014. https://doi.org/10.1007/s11042-013-1625-3
- S. Shyu, and M. Chen, "Optimum pixel expansions for threshold visual secret sharing schemes," IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.960-969, 2011. https://doi.org/10.1109/TIFS.2011.2158096
- G. Shen, F. Liu, Z. Fu, and B. Yu, "Perfect contrast XOR-based visual cryptography schemes via linear algebra," Designs Codes and Cryptography, vol.85, no.1, pp.15-37, 2017. https://doi.org/10.1007/s10623-016-0285-5
- A. De Bonis and A. De Santis, "Randomness in secret sharing and visual cryptography schemes," Theoretical Computer Science, vol.314, no.3, pp.351-374, 2004. https://doi.org/10.1016/j.tcs.2003.12.018
- Y. C. Chen, "Fully incrementing visual cryptography from a succinct non-monotonic structure," IEEE Transactions on Information Forensics and Security, vol.12, no.5, pp.1082-1091, 2017. https://doi.org/10.1109/TIFS.2016.2641378
- X. Yan, S. Wang, X. Niu, and C. N. Yang, "Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality," Digital Signal Processing, vol.38, no.C, pp.53-65, 2015. https://doi.org/10.1016/j.dsp.2014.12.002
- Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, "Cheating prevention visual cryptography scheme using Latin square," IET Information Security, vol.11, no.4, pp.211-219, 2017. https://doi.org/10.1049/iet-ifs.2016.0126
- F. Liu, C. Wu, and X. Lin, "Cheating immune visual cryptography scheme," IET Information Security, vol.5, no.1, pp.51-59, 2011. https://doi.org/10.1049/iet-ifs.2008.0064
- Z. Wang, G. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Transactions on Information Forensics and Security, vol.4, no.3, pp.383-396, 2009. https://doi.org/10.1109/TIFS.2009.2024721
- S. Shivendra and A. Suneeta, "Progressive Visual Cryptography with Unexpanded Meaningful Shares," ACM Transactions on Multimedia Computing, Communications, and Applications, vol.12, no.4, pp.1-24, 2016.
- C. Yang, H. Shih, C. Wu, and L. Harn, "k out of n region incrementing scheme in visual cryptography," IEEE Transactions on Circuits and Systems for Video Technology, vol.22, no.5, pp.799-810, 2012. https://doi.org/10.1109/TCSVT.2011.2180952
- G. Wang, W. Yan, and M. Kankanhalli, "Content based authentication of visual cryptography," Multimedia Tools and Applications, vol.76, no.7, pp.9427-9441, 2017. https://doi.org/10.1007/s11042-016-3549-1
- C. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol.25, no.4, pp. 481-494, 2014. https://doi.org/10.1016/j.patrec.2003.12.011
- S. Cimato, A. R. Prisco, and D. Santis, "Probabilistic visual cryptography schemes," The Computer Journal, vol.49, no.1 pp.97-107, 2006. https://doi.org/10.1093/comjnl/bxh152
- S. Shyu, "Image encryption by random grids," Pattern Recognition, vol.40, no.3, pp.1014-1031, 2007. https://doi.org/10.1016/j.patcog.2006.02.025
- S. Shyu, "Image encryption by multiple random grids," Pattern Recognition, vol.42, no.7, pp.1582-1596, 2009. https://doi.org/10.1016/j.patcog.2008.08.023
- T. Chen and K. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognition, vol.42, no.9, pp.2203-2217, 2009. https://doi.org/10.1016/j.patcog.2008.11.015
- T. Chen and K. Tsao, "Threshold visual secret sharing by random grids," Journal of Systems and Software, vol.84, no.7, pp.1197-1208, 2011. https://doi.org/10.1016/j.jss.2011.02.023
- X. Wu and W. Sun, "Random grid-based visual secret sharing for general access structures with cheat-preventing ability," Journal of Systems and Software, vol.85, no.5 pp.1119-1134, 2011. https://doi.org/10.1016/j.jss.2011.12.041
- X. Wu and W. Sun, "Visual secret sharing for general access structures by random grids," IET Information Security, vol.6, no.4, pp.299-309, 2012. https://doi.org/10.1049/iet-ifs.2012.0046
- S. Shyu, "Visual cryptograms of random grids for general access structures," IEEE Transactions on Circuits and Systems for Video Technology, vol.23, no.3, pp.414-424, 2013. https://doi.org/10.1109/TCSVT.2012.2204940
- X. Wu and W. Sun, "Random grid-based visual secret sharing with abilities of OR and XOR decryptions," Journal of Visual Communication and Image Representation, vol.24, no.1, pp.48-62, 2013. https://doi.org/10.1016/j.jvcir.2012.11.001
- T. Chen and K. Tsao, "User-friendly random-grid-based visual secret sharing," IEEE Transactions on Circuits and Systems for Video Technology, vol.21, no.11, pp.1693-1703, 2011. https://doi.org/10.1109/TCSVT.2011.2133470
- X. Yan, Y. Lu, H. Huang, L. Liu, and S. Wan, "Quality-adaptive threshold visual secret sharing by random grids," in Proc. of IEEE International Conference on Signal and Image Processing, pp. 323-327, 2017.
- X. Yan and Y. Lu, "Participants increasing for threshold random grids-based visual secret sharing," Journal of Real-Time Image Processing, vol. 14, no.1, pp.13-24, 2018. https://doi.org/10.1007/s11554-016-0639-2
- H. C. Chao and T. Y. Fan, "Random-grid based progressive visual secret sharing scheme with adaptive priority," Digital Signal Processing, vol.68, pp.69-80, 2017. https://doi.org/10.1016/j.dsp.2017.05.009
- Z. Fu and B. Yu, "Visual cryptography and random grids schemes," in Proc. of 12th International Workshop on Digital-Forensics and Watermarking, pp.109-122, 2013.
- C. N. Yang, C. C. Wu, and D. S. Wang, "A discussion on the relationship between probabilistic visual cryptography and random grid," Information Sciences, vol.278, no.10, pp.141-173, 2014. https://doi.org/10.1016/j.ins.2014.03.033
- T. Guo, F. Liu, and C. Wu, "Threshold visual secret sharing by random grids with improved contrast," Journal of Systems and Software, vol.86, no.8, pp.2094-2109, 2013. https://doi.org/10.1016/j.jss.2013.03.062
- X. Wu and W. Sun, "Improving the visual quality of random grid-based visual secret sharing," Signal Processing, vol.93, no.5, pp.977-995, 2013. https://doi.org/10.1016/j.sigpro.2012.11.014
- S. Shyu, "Visual cryptograms of random grids for threshold access structures," Theoretical Computer Science, vol.565, pp.30-49, 2015. https://doi.org/10.1016/j.tcs.2014.10.048
- X. Yan, X. Liu, and C. N. Yang, "An enhanced threshold visual secret sharing based on random grids," Journal of Real-Time Image Processing, pp.1-13, 2015.
Cited by
- A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/7937816
- An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission vol.14, pp.7, 2018, https://doi.org/10.3837/tiis.2020.07.007