메뉴 건너뛰기




Volumn 40, Issue 8, 2007, Pages 2356-2366

A cheating prevention scheme for binary visual cryptography with homogeneous secret images

Author keywords

Cheating; Cheating prevention; Genetic algorithm; Visual cryptography

Indexed keywords

AUTHENTICATION; GENETIC ALGORITHMS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 34147183148     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2007.01.013     Document Type: Article
Times cited : (89)

References (17)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun. ACM 22 (1979) 612-613
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 2
    • 34147150870 scopus 로고    scopus 로고
    • G. Blakley, Safeguarding cryptographic keys, in Proceedings of AFIPS 1979 National Conference.
  • 3
    • 84926193517 scopus 로고    scopus 로고
    • M. Naor, A. Shamir, Visual cryptography, in Proceedings of advances in cryptography-EUROCRYOT'94, Lecture Notes in Computer Sciences, vol. 950, 1994. pp. 1-12.
  • 4
    • 34147185461 scopus 로고    scopus 로고
    • A. Shamir, M. Naor, Visual Cryptography II: Improving the Contrast via the Cover Base, Security in Communication Networks, September 16-17, 1996.
  • 7
    • 0034326194 scopus 로고    scopus 로고
    • Visual cryptography for grey level images
    • Blundo C., De Santis A., and Naor M. Visual cryptography for grey level images. Inform. Process. Lett. 75 6 (2000) 255-259
    • (2000) Inform. Process. Lett. , vol.75 , Issue.6 , pp. 255-259
    • Blundo, C.1    De Santis, A.2    Naor, M.3
  • 8
    • 0037233509 scopus 로고    scopus 로고
    • Visual cryptography for gray-level images by dithering techniques
    • Lin C.C., and Tsai W.H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Lett. 24 1-3 (2003) 349-358
    • (2003) Pattern Recognition Lett. , vol.24 , Issue.1-3 , pp. 349-358
    • Lin, C.C.1    Tsai, W.H.2
  • 9
    • 0242582715 scopus 로고    scopus 로고
    • ELcient colour visual encryption for shared colors of Benetton
    • Rump Session, Berlin
    • Rijmen V., and Preneel B. ELcient colour visual encryption for shared colors of Benetton. Eurocrypto'96 (1996), Rump Session, Berlin
    • (1996) Eurocrypto'96
    • Rijmen, V.1    Preneel, B.2
  • 10
    • 0037411307 scopus 로고    scopus 로고
    • Visual cryptography for color images
    • Hou Y.C. Visual cryptography for color images. Pattern Recognition 36 (2003) 1619-1629
    • (2003) Pattern Recognition , vol.36 , pp. 1619-1629
    • Hou, Y.C.1
  • 11
    • 84958648410 scopus 로고    scopus 로고
    • M. Naor, B. Pinkas, Visual authentication and identification, in: B.S. Kaliski Jr., (Ed.), Advances in Cryptology-Proceedings of Crypto 97, Lecture Notes in Computer Science, Springer, New York, vol. 1294, 1997. pp. 322-336.
  • 12
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level image using visual secret sharing strategy
    • Chang C.C., and Chuang J.C. An image intellectual property protection scheme for gray-level image using visual secret sharing strategy. Pattern Recognition Lett. 23 (2002) 931-941
    • (2002) Pattern Recognition Lett. , vol.23 , pp. 931-941
    • Chang, C.C.1    Chuang, J.C.2
  • 13
    • 0034251536 scopus 로고    scopus 로고
    • Repeating image watermarking technique by the visual cryptography
    • Wang C.C., Tai S.C., and Yu C.S. Repeating image watermarking technique by the visual cryptography. IEICE Trans. Fundam. E83-A (2000) 1589-1598
    • (2000) IEICE Trans. Fundam. , vol.E83-A , pp. 1589-1598
    • Wang, C.C.1    Tai, S.C.2    Yu, C.S.3
  • 14
    • 13644263677 scopus 로고    scopus 로고
    • Bit-level based secret sharing for image encryption
    • Lukac R., and Plataniotis K.N. Bit-level based secret sharing for image encryption. Pattern Recognition 38 5 (2005) 767-772
    • (2005) Pattern Recognition , vol.38 , Issue.5 , pp. 767-772
    • Lukac, R.1    Plataniotis, K.N.2
  • 16
    • 0001476931 scopus 로고
    • A perfect threshold secret sharing scheme to identify cheaters
    • Carpenteri M. A perfect threshold secret sharing scheme to identify cheaters. Designs codes Cryptogr. 5 (1995) 183-187
    • (1995) Designs codes Cryptogr. , vol.5 , pp. 183-187
    • Carpenteri, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.