메뉴 건너뛰기




Volumn 38, Issue 2, 2006, Pages 219-236

Cheating in visual cryptography

Author keywords

Cheating; Secret sharing; Visual authentication; Visual cryptography

Indexed keywords

CRYPTOGRAPHY; IMAGE ANALYSIS; MATHEMATICAL TECHNIQUES; SET THEORY; TRANSPARENCY;

EID: 30744474182     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-005-6342-0     Document Type: Article
Times cited : (127)

References (14)
  • 1
    • 85062838317 scopus 로고
    • Proc. AFIPS 1979 Natl. Conf. New York
    • G. Blakley, Safeguarding Cryptographic Keys, Proc. AFIPS 1979 Natl. Conf. New York, Vol. 48 (1979) pp. 313-317.
    • (1979) Safeguarding Cryptographic Keys , vol.48 , pp. 313-317
    • Blakley, G.1
  • 2
    • 0005167951 scopus 로고
    • The detection of cheaters in threshold schemes
    • E. F. Brickell and D. R. Stinson, The detection of cheaters in threshold schemes, SIAM J. Disc. Math., Vol. 4 (1991) pp. 502-510.
    • (1991) SIAM J. Disc. Math. , vol.4 , pp. 502-510
    • Brickell, E.F.1    Stinson, D.R.2
  • 3
    • 0001476931 scopus 로고
    • A perfect threshold secret sharing scheme to identify cheaters
    • M. Carpenteri, A perfect threshold secret sharing scheme to identify cheaters, Des. Codes Cryptogr., Vol. 5 (1995) pp. 183-187.
    • (1995) Des. Codes Cryptogr. , vol.5 , pp. 183-187
    • Carpenteri, M.1
  • 4
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level image using visual secret sharing strategy
    • C. C. Chang and J. C. Chuang, An image intellectual property protection scheme for gray-level image using visual secret sharing strategy, Pattern Recogn. Lett., Vol. 23 (2002) pp. 931-941.
    • (2002) Pattern Recogn. Lett. , vol.23 , pp. 931-941
    • Chang, C.C.1    Chuang, J.C.2
  • 5
    • 0030676509 scopus 로고    scopus 로고
    • Efficient cheater identification method for threshold schemes
    • C. C. Chang and R. J. Hwang, Efficient cheater identification method for threshold schemes, IEE Proc.-Comput. Digit. Technol., Vol. 144 (1997), pp. 23-27.
    • (1997) IEE Proc.-Comput. Digit. Technol. , vol.144 , pp. 23-27
    • Chang, C.C.1    Hwang, R.J.2
  • 6
    • 30744441498 scopus 로고    scopus 로고
    • http://www.cacr.math.uwaterloo.ca/~dstinson
  • 7
    • 84958648410 scopus 로고    scopus 로고
    • Visual authentication and identification
    • Burton S. Kaliski Jr. (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
    • M. Naor and B. Pinkas, Visual Authentication and Identification, In Burton S. Kaliski Jr. (ed.), Advances in Cryptology - Proceedings of Crypto 97, Lecture Notes in Computer Science, Springer-Verlag, New York, 1294 (1997) pp. 322-336.
    • (1997) Advances in Cryptology - Proceedings of Crypto 97 , vol.1294 , pp. 322-336
    • Naor, M.1    Pinkas, B.2
  • 8
    • 84926193517 scopus 로고
    • Visual cryptography
    • Alfredo De Santis (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
    • M. Naor and A. Shamir, Visual cryptography, In Alfredo De Santis (ed.), Advances in Cryptology - Proceedings of Eurocypto 94, Lecture Notes in Computer Science, Springer-Verlag, New York, 950 (1995) pp. 1-12.
    • (1995) Advances in Cryptology - Proceedings of Eurocypto 94 , vol.950 , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 9
    • 84947903522 scopus 로고    scopus 로고
    • Optimum secret sharing scheme secure against cheating
    • Ueli M. Maurer (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
    • W. Ogata and K. Kurosawa, Optimum secret sharing scheme secure against cheating, In Ueli M. Maurer (ed.), Advances in Cryptology - Proceedings of Eurocypto 96, Lecture Notes in Computer Science, Springer-Verlag, New York, 1070 (1996) pp. 200-211.
    • (1996) Advances in Cryptology - Proceedings of Eurocypto 96 , vol.1070 , pp. 200-211
    • Ogata, W.1    Kurosawa, K.2
  • 10
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, Vol. 36 (1989) pp. 335-348.
    • (1989) J. ACM , vol.36 , pp. 335-348
    • Rabin, M.1
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Comm. ACM, Vol. 22 (1979) pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 12
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their applications
    • IEEE Press, Piscataway
    • G. J. Simmons, An introduction to shared secret and/or shared control schemes and their applications, Contemporary Cryptology, IEEE Press, Piscataway (1991) pp. 491-497.
    • (1991) Contemporary Cryptology , pp. 491-497
    • Simmons, G.J.1
  • 13
    • 0024141971 scopus 로고
    • How to share a secret with cheaters
    • M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptology, Vol. 1 (1988) pp. 133-138.
    • (1988) J. Cryptology , vol.1 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 14
    • 0034251536 scopus 로고    scopus 로고
    • Repeating image watermarking technique by the visual cryptography
    • C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Trans. Fundamentals, Vol. E83-A (2000) pp. 1589-1598.
    • (2000) IEICE Trans. Fundamentals , vol.E83-A , pp. 1589-1598
    • Wang, C.C.1    Tai, S.C.2    Yu, C.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.