-
1
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 22 (1979) 612-613
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
34147150870
-
-
G. Blakley, Safeguarding cryptographic keys, in Proceedings of AFIPS 1979 National Conference.
-
-
-
-
3
-
-
84926193517
-
-
M. Naor, A. Shamir, Visual cryptography, in Proceedings of advances in cryptography-EUROCRYOT'94, Lecture Notes in Computer Sciences, vol. 950, 1994. pp. 1-12.
-
-
-
-
4
-
-
34147185461
-
-
A. Shamir, M. Naor, Visual Cryptography II: Improving the Contrast via the Cover Base, Security in Communication Networks, September 16-17, 1996.
-
-
-
-
5
-
-
0038813895
-
Contrast optimal threshold visual cryptography schemes
-
Blundo C., D'Arco P., De Santis A., and Stinson D.R. Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16 2 (2003) 224-261
-
(2003)
SIAM J. Discrete Math.
, vol.16
, Issue.2
, pp. 224-261
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
Stinson, D.R.4
-
8
-
-
0037233509
-
Visual cryptography for gray-level images by dithering techniques
-
Lin C.C., and Tsai W.H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Lett. 24 1-3 (2003) 349-358
-
(2003)
Pattern Recognition Lett.
, vol.24
, Issue.1-3
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
9
-
-
0242582715
-
ELcient colour visual encryption for shared colors of Benetton
-
Rump Session, Berlin
-
Rijmen V., and Preneel B. ELcient colour visual encryption for shared colors of Benetton. Eurocrypto'96 (1996), Rump Session, Berlin
-
(1996)
Eurocrypto'96
-
-
Rijmen, V.1
Preneel, B.2
-
10
-
-
0037411307
-
Visual cryptography for color images
-
Hou Y.C. Visual cryptography for color images. Pattern Recognition 36 (2003) 1619-1629
-
(2003)
Pattern Recognition
, vol.36
, pp. 1619-1629
-
-
Hou, Y.C.1
-
11
-
-
84958648410
-
-
M. Naor, B. Pinkas, Visual authentication and identification, in: B.S. Kaliski Jr., (Ed.), Advances in Cryptology-Proceedings of Crypto 97, Lecture Notes in Computer Science, Springer, New York, vol. 1294, 1997. pp. 322-336.
-
-
-
-
12
-
-
0036605019
-
An image intellectual property protection scheme for gray-level image using visual secret sharing strategy
-
Chang C.C., and Chuang J.C. An image intellectual property protection scheme for gray-level image using visual secret sharing strategy. Pattern Recognition Lett. 23 (2002) 931-941
-
(2002)
Pattern Recognition Lett.
, vol.23
, pp. 931-941
-
-
Chang, C.C.1
Chuang, J.C.2
-
13
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
Wang C.C., Tai S.C., and Yu C.S. Repeating image watermarking technique by the visual cryptography. IEICE Trans. Fundam. E83-A (2000) 1589-1598
-
(2000)
IEICE Trans. Fundam.
, vol.E83-A
, pp. 1589-1598
-
-
Wang, C.C.1
Tai, S.C.2
Yu, C.S.3
-
14
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
Lukac R., and Plataniotis K.N. Bit-level based secret sharing for image encryption. Pattern Recognition 38 5 (2005) 767-772
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
16
-
-
0001476931
-
A perfect threshold secret sharing scheme to identify cheaters
-
Carpenteri M. A perfect threshold secret sharing scheme to identify cheaters. Designs codes Cryptogr. 5 (1995) 183-187
-
(1995)
Designs codes Cryptogr.
, vol.5
, pp. 183-187
-
-
Carpenteri, M.1
|