1 |
S. Cimato and C.-N. Yang, "Visual Cryptography and Secret Image Sharing," New York, USA: CRC Press, Aug. 2011, pp. 5-16.
|
2 |
M. Naor and A. Shamir, "Visual Cryptography," Workshop Theory Appl. Cryptographic Techn., Perugia, Italy, May 9-12, 1994, pp. 1-12.
|
3 |
R. Ito, H. Kuwakado, and H. Tanaka, "Image Size Invariant Visual Cryptography," IEICE Trans. Fundam. Electron., Commun. Comput. Sci., vol. E82-A, Oct. 1999, pp. 2172-2177.
|
4 |
C.-N. Yang, "New Visual Secret Sharing Schemes Using Probabilistic Method," Pattern Recogn. Lett., vol. 25, no. 4, Mar. 2004, pp. 481-494.
DOI
|
5 |
S. Cimato, R. de Prisco, and A. de Santis, "Probabilistic Visual Cryptography Schemes," Comput. J., vol. 49, no. 1, Jan. 2006, pp. 97-107.
DOI
|
6 |
D. Wang, F. Yi, and X. Li, "Probabilistic Visual Secret Sharing Schemes for Grey-Scale Images and Color Images," Inf. Sci., vol. 181, no. 11, June 2011, pp. 2189-2208.
DOI
|
7 |
Y.C. Hou et al., "Block-Based Progressive Visual Secret Sharing," Inf. Sci., vol. 233, June 2013, pp. 290-304.
DOI
|
8 |
E.R. Verheul and H.C.A. van Tilborg, "Constructions and Properties of k out of n Visual Secret Sharing Schemes," Des., Codes Cryptography, vol. 11, no. 2, May 1997, pp. 179-196.
DOI
|
9 |
M. Bose and R. Mukerjee, "Optimal (k, n) Visual Cryptographic Schemes for General k," Des., Codes, Cryptography, vol. 55, no. 1, Apr. 2010, pp. 19-35.
DOI
|
10 |
S.J. Shyu and M.C. Chen, "Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, May 2011, pp. 960-969.
DOI
|
11 |
F. Liu, C.K. Wu, and X.J. Lin, "Some Extensions on Threshold Visual Cryptography Schemes," Comput. J., vol. 53, no. 1, Jan. 2010, pp. 107-119.
DOI
|
12 |
G. Ateniese et al., "Extended Capabilities for Visual Cryptography," Theoretical Comput. Sci., vol. 250, no. 1-2, Jan. 2001, pp. 143-161.
DOI
|