1 |
M. Naor and A. Shamir, 'Visual cryptography,' Advances in Cryptography Eurocrypt 94, vol. 950, pp. 1 -12, 1995
DOI
|
2 |
C. Blundo, A. De Santis and D. R. Stinson. 'On the contrast in visual cryptography schemes,' ftp://theory.lcs.mit.edu/pub/tcrytol/96-13.ps, 1996
|
3 |
A. Shamir, 'How to share a secret,' Communications of ACM, vol. 22, pp. 612-613, 1979
DOI
ScienceOn
|
4 |
S.H.Lee, S.Y.Yi, and E.S.Kim, 'Hardware implementation of multi-target tracking system based on binary phase extraction JTC,' Journal of the Korea Institute of Telematics and Electronics, vol. 33-A, no.10, pp. 152-159, 1993
과학기술학회마을
|
5 |
G. Tricoles, 'Computer generated holograms: an historical review,' Appl. Opt., vol.26, no.20, pp. 4351-4360, 1987
|
6 |
S.Y. Vi, C.S.Ryu, S.H.Lee, and E.S.Kim, 'Encryption of cell-oriented computer generated hologram by using visual cryptography,' CLEO/Pacific Rim'99, pp. 817-818, 1999
DOI
|