-
1
-
-
0034899594
-
"Extended capabilities for visual cryptography"
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Extended capabilities for visual cryptography," Theoret. Comput. Sci., vol. 250, no. 1-2, pp. 134-161, 2001.
-
(2001)
Theoret. Comput. Sci.
, vol.250
, Issue.1-2
, pp. 134-161
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
85075964728
-
"The void-and-cluster method for dither airay generation"
-
in Sep
-
R. A. Ulichney, "The void-and-cluster method for dither airay generation," in Proc. SPIE, Human Vision, Visual Processing, Digital Displays IV, Sep. 1996, vol. 1913, pp. 332-343.
-
(1996)
Proc. SPIE, Human Vision, Visual Processing, Digital Displays IV
, vol.1913
, pp. 332-343
-
-
Ulichney, R.A.1
-
3
-
-
84926193517
-
"Visual cryptography"
-
M. Naor and A. Shamir, "Visual cryptography," Adv. Cryptol.: EURO-CRYPT, Lecture Notes Comput. Sci., vol. 950, pp. 1-12, 1995.
-
(1995)
Adv. Cryptol.: EURO-CRYPT, Lecture Notes Comput. Sci.
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
4
-
-
84978983299
-
"Visual cryptography II: Improving the contrast via the cover base"
-
in Amalfi, Italy
-
M. Naor and A. Shamir, "Visual cryptography II: Improving the contrast via the cover base," in Security in Communication Networks, Lecture Notes in Computer Science. Amalfi, Italy:, 1996, vol. 1189, pp. 197-202.
-
(1996)
Security in Communication Networks, Lecture Notes in Computer Science
, vol.1189
, pp. 197-202
-
-
Naor, M.1
Shamir, A.2
-
5
-
-
84958648410
-
"Visual authentication and identification"
-
M. Naor and B. Pinkas, "Visual authentication and identification," Crypto, Lecture Notes Comput. Sci., vol. 1294, pp. 322-340, 1997.
-
(1997)
Crypto, Lecture Notes Comput. Sci.
, vol.1294
, pp. 322-340
-
-
Naor, M.1
Pinkas, B.2
-
6
-
-
0035605439
-
"A copyright protection scheme of images based on visual cryptography"
-
C. Chang and H. Wu, "A copyright protection scheme of images based on visual cryptography," Imag. Sci. J., vol. 49, no. 3, pp. 141-150, 2001.
-
(2001)
Imag. Sci. J.
, vol.49
, Issue.3
, pp. 141-150
-
-
Chang, C.1
Wu, H.2
-
7
-
-
0034251536
-
"Repeating image watermarking technique by the visual cryptography"
-
Aug
-
C. Wang, S. Tai, and C. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E83A, no. 8, pp. 1589-1598, Aug. 2000.
-
(2000)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E83A
, Issue.8
, pp. 1589-1598
-
-
Wang, C.1
Tai, S.2
Yu, C.3
-
8
-
-
0000437895
-
"On the contrast in visual cryptography schemes"
-
C. Blundo, A. De Santis, and D. R. Stinson, "On the contrast in visual cryptography schemes," J. Cryptol.: J. Int. Assoc. Cryptol. Res., vol. 12, no. 4, pp. 261-289, 1999.
-
(1999)
J. Cryptol.: J. Int. Assoc. Cryptol. Res.
, vol.12
, Issue.4
, pp. 261-289
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
-
9
-
-
0038813895
-
"Contrast optimal threshold visual cryptography schemes"
-
C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson, "Contrast optimal threshold visual cryptography schemes," SIAM J. Discrete Math., vol. 16, no. 2, pp. 224-261, 2003.
-
(2003)
SIAM J. Discrete Math.
, vol.16
, Issue.2
, pp. 224-261
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
Stinson, D.R.4
-
10
-
-
0037600743
-
"Contrast-optimal k out of n secret sharing schemes in visual cryptography"
-
Jun
-
T. Hofmeister, M. Krause, and H. U. Simon, "Contrast-optimal k out of n secret sharing schemes in visual cryptography," Theoret. Comput. Sci., vol. 240, no. 2, pp. 471-485, Jun. 2000.
-
(2000)
Theoret. Comput. Sci.
, vol.240
, Issue.2
, pp. 471-485
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.U.3
-
11
-
-
0002015048
-
"Visual cryptography for general access structures"
-
Sep
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Comput., vol. 129, no. 2, pp. 86-106, Sep. 1996.
-
(1996)
Inf. Comput.
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
12
-
-
84947751790
-
"Constructions and bounds for visual cryptography"
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Constructions and bounds for visual cryptography," in Proc. 23rd Int. Colloq. Automata, Languages and Programming, 1996, vol. 1099, pp. 416-428.
-
(1996)
Proc. 23rd Int. Colloq. Automata, Languages and Programming
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
13
-
-
0034326194
-
"Visual cryptography for grey level images"
-
C. Blundo, A. De Santis, and M. Naor, "Visual cryptography for grey level images," Inf. Process. Lett., vol. 75, pp. 255-259, 2000.
-
(2000)
Inf. Process. Lett.
, vol.75
, pp. 255-259
-
-
Blundo, C.1
De Santis, A.2
Naor, M.3
-
14
-
-
84992213884
-
-
L. A. MacPherson, "Grey Level Visual Cryptography for General Access Structures," M.S. thesis, Univ. Waterloo, Waterloo, ON, Canada, 2002.
-
-
-
-
15
-
-
0032094202
-
"Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images"
-
Jun
-
H. Koga and H. Yamamoto, "Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images," IEICE Trans. Fundam., vol. E81-A, no. 6, pp. 1263-1269, Jun. 1998.
-
(1998)
IEICE Trans. Fundam.
, vol.E81-A
, Issue.6
, pp. 1263-1269
-
-
Koga, H.1
Yamamoto, H.2
-
16
-
-
0036454464
-
"New constructions of the lattice-based visual secret sharing scheme using mixture of colors"
-
Jan
-
T. Ishihara and H. Koga, "New constructions of the lattice-based visual secret sharing scheme using mixture of colors," IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E85A, no. 1, pp. 158-166, Jan. 2002.
-
(2002)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E85A
, Issue.1
, pp. 158-166
-
-
Ishihara, T.1
Koga, H.2
|