Improved Contrast for Threshold Random-grid-based Visual Cryptography |
Hu, Hao
(China National Digital Switching System Engineering and Technological Research Center)
Shen, Gang (Zhengzhou Information Science and Technology Institute) Fu, Zhengxin (Zhengzhou Information Science and Technology Institute) Yu, Bin (Zhengzhou Information Science and Technology Institute) |
1 | G. Shen, F. Liu, Z. Fu, and B. Yu, "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure," Multimedia Tools and Applications, vol.72, no.16, pp.14511-14533, 2017. |
2 | Z. Fu and B. Yu, "Optimal pixel expansion of deterministic visual cryptography scheme," Multimedia Tools and Applications, vol.73, no.3, pp.1177-1193, 2014. DOI |
3 | S. Shyu, and M. Chen, "Optimum pixel expansions for threshold visual secret sharing schemes," IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.960-969, 2011. DOI |
4 | G. Shen, F. Liu, Z. Fu, and B. Yu, "Perfect contrast XOR-based visual cryptography schemes via linear algebra," Designs Codes and Cryptography, vol.85, no.1, pp.15-37, 2017. DOI |
5 | A. De Bonis and A. De Santis, "Randomness in secret sharing and visual cryptography schemes," Theoretical Computer Science, vol.314, no.3, pp.351-374, 2004. DOI |
6 | Y. C. Chen, "Fully incrementing visual cryptography from a succinct non-monotonic structure," IEEE Transactions on Information Forensics and Security, vol.12, no.5, pp.1082-1091, 2017. DOI |
7 | X. Yan, S. Wang, X. Niu, and C. N. Yang, "Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality," Digital Signal Processing, vol.38, no.C, pp.53-65, 2015. DOI |
8 | Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, "Cheating prevention visual cryptography scheme using Latin square," IET Information Security, vol.11, no.4, pp.211-219, 2017. DOI |
9 | F. Liu, C. Wu, and X. Lin, "Cheating immune visual cryptography scheme," IET Information Security, vol.5, no.1, pp.51-59, 2011. DOI |
10 | Z. Wang, G. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Transactions on Information Forensics and Security, vol.4, no.3, pp.383-396, 2009. DOI |
11 | S. Cimato, A. R. Prisco, and D. Santis, "Probabilistic visual cryptography schemes," The Computer Journal, vol.49, no.1 pp.97-107, 2006. DOI |
12 | M. Naor and A. Shamir, "Visual cryptography," in Proc. of Workshop on the Theory and Application of of Cryptographic Techniques. vol.950, pp.1-12, 1994. |
13 | O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, vol.12, no.6, pp.377-379, 1987. DOI |
14 | G. Ateniese, C. Blundo, A. De Santis, and D. Stinson, "Visual cryptography for general access structures," Information and Computation, vol.129, no.2, pp.86-106, 1996. DOI |
15 | S. Shivendra and A. Suneeta, "Progressive Visual Cryptography with Unexpanded Meaningful Shares," ACM Transactions on Multimedia Computing, Communications, and Applications, vol.12, no.4, pp.1-24, 2016. |
16 | C. Yang, H. Shih, C. Wu, and L. Harn, "k out of n region incrementing scheme in visual cryptography," IEEE Transactions on Circuits and Systems for Video Technology, vol.22, no.5, pp.799-810, 2012. DOI |
17 | G. Wang, W. Yan, and M. Kankanhalli, "Content based authentication of visual cryptography," Multimedia Tools and Applications, vol.76, no.7, pp.9427-9441, 2017. DOI |
18 | C. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol.25, no.4, pp. 481-494, 2014. DOI |
19 | S. Shyu, "Image encryption by random grids," Pattern Recognition, vol.40, no.3, pp.1014-1031, 2007. DOI |
20 | S. Shyu, "Image encryption by multiple random grids," Pattern Recognition, vol.42, no.7, pp.1582-1596, 2009. DOI |
21 | T. Chen and K. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognition, vol.42, no.9, pp.2203-2217, 2009. DOI |
22 | T. Chen and K. Tsao, "Threshold visual secret sharing by random grids," Journal of Systems and Software, vol.84, no.7, pp.1197-1208, 2011. DOI |
23 | X. Wu and W. Sun, "Random grid-based visual secret sharing for general access structures with cheat-preventing ability," Journal of Systems and Software, vol.85, no.5 pp.1119-1134, 2011. DOI |
24 | X. Wu and W. Sun, "Visual secret sharing for general access structures by random grids," IET Information Security, vol.6, no.4, pp.299-309, 2012. DOI |
25 | X. Yan, Y. Lu, H. Huang, L. Liu, and S. Wan, "Quality-adaptive threshold visual secret sharing by random grids," in Proc. of IEEE International Conference on Signal and Image Processing, pp. 323-327, 2017. |
26 | S. Shyu, "Visual cryptograms of random grids for general access structures," IEEE Transactions on Circuits and Systems for Video Technology, vol.23, no.3, pp.414-424, 2013. DOI |
27 | X. Wu and W. Sun, "Random grid-based visual secret sharing with abilities of OR and XOR decryptions," Journal of Visual Communication and Image Representation, vol.24, no.1, pp.48-62, 2013. DOI |
28 | T. Chen and K. Tsao, "User-friendly random-grid-based visual secret sharing," IEEE Transactions on Circuits and Systems for Video Technology, vol.21, no.11, pp.1693-1703, 2011. DOI |
29 | X. Yan and Y. Lu, "Participants increasing for threshold random grids-based visual secret sharing," Journal of Real-Time Image Processing, vol. 14, no.1, pp.13-24, 2018. DOI |
30 | H. C. Chao and T. Y. Fan, "Random-grid based progressive visual secret sharing scheme with adaptive priority," Digital Signal Processing, vol.68, pp.69-80, 2017. DOI |
31 | Z. Fu and B. Yu, "Visual cryptography and random grids schemes," in Proc. of 12th International Workshop on Digital-Forensics and Watermarking, pp.109-122, 2013. |
32 | X. Yan, X. Liu, and C. N. Yang, "An enhanced threshold visual secret sharing based on random grids," Journal of Real-Time Image Processing, pp.1-13, 2015. |
33 | C. N. Yang, C. C. Wu, and D. S. Wang, "A discussion on the relationship between probabilistic visual cryptography and random grid," Information Sciences, vol.278, no.10, pp.141-173, 2014. DOI |
34 | T. Guo, F. Liu, and C. Wu, "Threshold visual secret sharing by random grids with improved contrast," Journal of Systems and Software, vol.86, no.8, pp.2094-2109, 2013. DOI |
35 | X. Wu and W. Sun, "Improving the visual quality of random grid-based visual secret sharing," Signal Processing, vol.93, no.5, pp.977-995, 2013. DOI |
36 | S. Shyu, "Visual cryptograms of random grids for threshold access structures," Theoretical Computer Science, vol.565, pp.30-49, 2015. DOI |