1 |
K. Curran, K. Bailey, "An evaluation of image based steganography method," International Journal of digital Evidence, Vol.2, pp. 1-40, 2003
|
2 |
C.C. Thien, J.C. Lin, "Secret image sharing," Computers & Graphics, Vol.26. pp. 765-770, May. 2002
DOI
ScienceOn
|
3 |
C. Blundo, A. De Santis, D.R. Stinson, "On the contrast in visual cryptography schemes," Journal of Cryptology, Vol.12, pp. 261-289, Apr. 1999
DOI
|
4 |
C. Blundo, A. De Bonis, A. De Santis, "Improved schemes for visual cryptography," Design, Codes, and Cryptography, Vol.24, No.3, pp. 255-278, Mar. 2001
DOI
|
5 |
A. Shamir, "How to share a secret," Comm. of the ACM, Vol.22. No.1, pp. 612-613, Nov. 1979
DOI
ScienceOn
|
6 |
M. Naor, A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT'94, LNCS Springer Verlag, Vol.950, pp. 1-12, May. 1994
|
7 |
J.B. Feng, H.C. Wu, C.S. Tsai, Y.P. Chu, "A new multi-secret images sharing scheme using largrange's interpolation," Journal of Systems & Software, Vol.76. No.3, pp. 327-339, Mar. 2005
DOI
ScienceOn
|
8 |
D. Wang, L. Zhanga, N. Maa, X. Lib, "Two secret sharing schemes based on boolean operations," Pattern Recognition Society, Vol.40, No.10, pp. 2776-2785, Oct. 2007
DOI
ScienceOn
|
9 |
W.P. Fang, "Friendly progressive visual secret sharing," Pattern Recognition Society, Vol.41, No.4, pp. 1410-1414, Apr. 2008
DOI
ScienceOn
|
10 |
T. Hofmeister, M. Krause, H.U. Simon, "Contrast- optimal k out of n secret sharing schemes in visual cryptography," Theoretical Computer Science, Vol.240, No.2, pp. 471-485, June 2000
DOI
ScienceOn
|