1 |
C. C. Wu and L. H. Chen, "A Study on Visual Cryptography," Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998. H. C. Wu and C. C. Chang, "Sharing Visual Multi-secrets using Circle Shares," Computer Standards & Interfaces, vol. 134, no. 28, pp. 123-135, 2005.
|
2 |
C. H. Wang, and T. Hwang, "(t,m) Threshold and Generalized ID-based Conference Key Distribution System," Applied Mathematics and Computation, vol. 112, no. 2-3, pp. 181-191, 2000.
DOI
ScienceOn
|
3 |
G. Wei, X. Yang, and J. Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII Transactions on Internet and Information Systems, vol. 6, no. 12, pp. 3352-3365, 2012.
|
4 |
D. Wang, L. Zhang N. Ma, and X. Li, "Two Secret Sharing Schemes Based on Boolean Operations," Pattern Recognition, vol. 40, no. 10, pp. 2776-2785, 2007.
DOI
ScienceOn
|
5 |
W. J. Zhang, "Robust Multiparty Quantum Secret Key Sharing over Two Collective-noise Channels," Physical A: Statistical Mechanics and its Applications, vol. 361, no. 1, pp. 233-238, 2006.
DOI
ScienceOn
|
6 |
W. K. Chen, "Image Sharing Method for Gray-level Images," Journal of Systems and Software, vol. 86, no. 2, pp. 581-585, 2013.
DOI
ScienceOn
|
7 |
J. Chen, Y. S. Chen, H. C. Hsu, and H. W. Chen, "New Visual Cryptography System Based on Circular Shadow Image and Fixed Angle Segmentation," Journal of Electronic Imaging, vol. 14, no. 3, pp. 0330181 - 033018-5, 2005.
|
8 |
D. Catalano and R. Gennaro, "New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications," Journal of Computer and System Sciences, vol. 61, no. 1, pp. 51-80, 2000.
DOI
ScienceOn
|
9 |
T. H. Chen and C. S. Wu, "Efficient Multi-secret Image Sharing based on Boolean Operations," Signal Processing, vol. 91, pp. 90-97, 2011.
DOI
ScienceOn
|
10 |
D. W. Clark and L. J. Weng, "Maximal and Near-Maximal Shift Register Sequences: Efficient Event Counters and Easy Discrete Logarithms," IEEE Transactions on Computers, vol. 43, no. 5, pp. 560-568, 1994.
DOI
ScienceOn
|
11 |
C. C. Lin and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, vol. 73, vol. 3, pp. 405-414, 2004.
DOI
ScienceOn
|
12 |
J. Nam, M. Kim, J. Paik, and D. Won, "Security weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment," KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 751-765, 2012.
|
13 |
M. Naor and A. Shamir, "Visual Cryptography," Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1994.
|
14 |
A. Shamir, "How to Share a Secret," Communication of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
DOI
ScienceOn
|
15 |
S. J. Shyu, S. Y. Huang, Y. K. Lee, and R. Z. Wang, "Sharing Multiple Secrets in Visual Cryptography," Pattern Recognition, vol. 40, no. 12, pp. 3633-3651, 2007.
DOI
ScienceOn
|
16 |
C. C. Thien, and J. C. Lin, "Secret Image Sharing," Computer & Graphics, vol. 26, pp. 765-770, 2002.
DOI
ScienceOn
|
17 |
C. Guo, C. C. Chang, N. Ma, and C. Qin, "A Multi-threshold Secret Image Sharing Scheme Based on MSP," Pattern Recognition Letters, vol. 33, pp. 1594-1600, 2012.
DOI
ScienceOn
|