-
1
-
-
85062838317
-
-
G.R. Blakley, Safeguarding cryptography keys, in: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, New York, USA, 1979, pp. 313-317.
-
-
-
-
2
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. Assoc. Comput. Mach. 22 11 (1979) 612-613
-
(1979)
Commun. Assoc. Comput. Mach.
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
3
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application, Contemporary cryptology
-
Simmons G.J. (Ed), IEEE Press, New York
-
Simmons G.J. An introduction to shared secret and/or shared control schemes and their application, Contemporary cryptology. In: Simmons G.J. (Ed). The Science of Information Integrity (1992), IEEE Press, New York 441-497
-
(1992)
The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
4
-
-
0000708528
-
An explication of secret sharing schemes
-
Stinson D.R. An explication of secret sharing schemes. Des. Codes Cryptography 2 (1992) 357-390
-
(1992)
Des. Codes Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
5
-
-
34249033100
-
-
H. Zheng, Linear threshold schemes, visual cryptography, and parasite-host cryptosystems, Ph.D. Dissertation of the Texas A&M University, 1998.
-
-
-
-
6
-
-
34249002046
-
-
Uehara, T. Nishizeki, Okamoto, K. Nakamura, Secret sharing scheme with matroid access structure, Trans. (A) I.E.C.E., Japan J69-A(9) (1986) 1124-1132.
-
-
-
-
7
-
-
0023543848
-
Secret sharing scheme realizing general access structure
-
IEEE Press, New York, NY, USA
-
Ito M., Saito A., and Nishizeki T. Secret sharing scheme realizing general access structure. IEEE/IECE Global Telecommunications Conference 1987 (1987), IEEE Press, New York, NY, USA 99-102
-
(1987)
IEEE/IECE Global Telecommunications Conference 1987
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
8
-
-
0024736850
-
Secret sharing scheme realizing general access structure
-
Ito M., Saito A., and Nishizeki T. Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. Part 3 72 9 (1989) 56-63
-
(1989)
Electron. Commun. Jpn. Part 3
, vol.72
, Issue.9
, pp. 56-63
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
9
-
-
0002015048
-
Visual cryptography for general access structures
-
Ateniese G., Blundo C., De Santis A., and Stinson D.R. Visual cryptography for general access structures. Inf. Comput. 129 2 (1996) 86-106
-
(1996)
Inf. Comput.
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
11
-
-
0032204204
-
Sharing secret images using shadow codebooks
-
Chang C.C., and Hwang R.J. Sharing secret images using shadow codebooks. Inf. Sci. 111 (1998) 335-345
-
(1998)
Inf. Sci.
, vol.111
, pp. 335-345
-
-
Chang, C.C.1
Hwang, R.J.2
-
12
-
-
0036794537
-
Secret image sharing
-
Thien C.C., and Lin J.C. Secret image sharing. Comput. Graphics 26 5 (2002) 765-770
-
(2002)
Comput. Graphics
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.C.1
Lin, J.C.2
-
13
-
-
0347946754
-
An image-sharing method with user-friendly shadow images
-
Thien C.C., and Lin J.C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13 12 (2003) 1161-1169
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.12
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
14
-
-
32844469722
-
Secret image sharing with smaller shadow images
-
Wang R.Z., and Su C.H. Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27 6 (2006) 551-555
-
(2006)
Pattern Recognition Lett.
, vol.27
, Issue.6
, pp. 551-555
-
-
Wang, R.Z.1
Su, C.H.2
-
15
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
16
-
-
1642635190
-
-
C.C. Chang, I.C. Lin, A new (t, n) threshold image hiding scheme for sharing a secret color image, in: Proceedings of the ICCT2003, vol. 1, Beijing, China, 2003, pp. 196-202.
-
-
-
-
17
-
-
14744284326
-
A new multi-secret images sharing scheme using Largrange's interpolation
-
Feng J.B., Wu H.C., Tsai C.S., and Chu Y.P. A new multi-secret images sharing scheme using Largrange's interpolation. J. Syst. Software 76 3 (2005) 327-339
-
(2005)
J. Syst. Software
, vol.76
, Issue.3
, pp. 327-339
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
Chu, Y.P.4
-
18
-
-
84926193517
-
-
M. Naor, A. Shamir, Visual cryptography, Advances in cryptology-EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, Springer, Berlin, 1995, pp. 1-12.
-
-
-
-
19
-
-
0000049121
-
Constructions and properties of k out of n visual secret sharing schemes
-
Verheul E.R., and Van Tilborg H.C.A. Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptography 11 2 (1997) 179-196
-
(1997)
Des. Codes Cryptography
, vol.11
, Issue.2
, pp. 179-196
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
-
20
-
-
0037600743
-
Contrast-optimal k out of n secret sharing schemes in visual cryptography
-
Hofmeister T., Krause M., and Simon H.U. Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240 2 (2000) 471-485
-
(2000)
Theor. Comput. Sci.
, vol.240
, Issue.2
, pp. 471-485
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.U.3
-
21
-
-
0000437895
-
On the contrast in visual cryptography schemes
-
Blundo C., De Santis A., and Stinson D.R. On the contrast in visual cryptography schemes. J. Cryptology 12 4 (1999) 261-289
-
(1999)
J. Cryptology
, vol.12
, Issue.4
, pp. 261-289
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
-
22
-
-
2642511567
-
A new visual cryptographic scheme using latin squares
-
Adhikari A., and Bose M. A new visual cryptographic scheme using latin squares. IEICE Trans. Fundam. E87-A 5 (2004) 1198-1202
-
(2004)
IEICE Trans. Fundam.
, vol.E87-A
, Issue.5
, pp. 1198-1202
-
-
Adhikari, A.1
Bose, M.2
-
23
-
-
34249009321
-
-
V. Rijmen, B. Preneel, Efficient colour visual encryption or 'Shared Colors of Benetton', Eurocrypto'96, Rump Session, Berlin, 1996. Available at 〈http://www.iacr.org/conferences/ec96/rump/preneel.ps〉.
-
-
-
-
24
-
-
0036574462
-
A note on efficient color visual encryption
-
Yang C.N. A note on efficient color visual encryption. J. Inf. Sci. Eng. 18 2 (2002) 367-372
-
(2002)
J. Inf. Sci. Eng.
, vol.18
, Issue.2
, pp. 367-372
-
-
Yang, C.N.1
-
26
-
-
0000793737
-
New colored visual secret sharing schemes
-
Yang C.N., and Laih C.S. New colored visual secret sharing schemes. Des. Codes Cryptography 20 3 (2000) 325-335
-
(2000)
Des. Codes Cryptography
, vol.20
, Issue.3
, pp. 325-335
-
-
Yang, C.N.1
Laih, C.S.2
-
28
-
-
0034326194
-
Visual cryptography for gray level images
-
Blundo C., De Santis A., and Naor M. Visual cryptography for gray level images. Inf. Process. Lett. 75 6 (2000) 255-259
-
(2000)
Inf. Process. Lett.
, vol.75
, Issue.6
, pp. 255-259
-
-
Blundo, C.1
De Santis, A.2
Naor, M.3
-
29
-
-
10044234541
-
Image size invariant visual cryptography
-
Ito R., Kuwakado H., and Tanaka H. Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A 10 (1999) 2172-2177
-
(1999)
IEICE Trans. Fundam.
, vol.E82-A
, Issue.10
, pp. 2172-2177
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
30
-
-
0035119988
-
An analytic construction of the visual secret sharing scheme for color images
-
Koga H., Iwamoto M., and Yamamoto H. An analytic construction of the visual secret sharing scheme for color images. IEICE Trans. Fundam. E84-A 1 (2001) 262-272
-
(2001)
IEICE Trans. Fundam.
, vol.E84-A
, Issue.1
, pp. 262-272
-
-
Koga, H.1
Iwamoto, M.2
Yamamoto, H.3
-
31
-
-
0036825941
-
The optimal n-out of-n visual secret sharing scheme for gray-scale images
-
Iwamoto M., and Yamamoto H. The optimal n-out of-n visual secret sharing scheme for gray-scale images. IEICE Trans. Fundam. E85-A 10 (2002) 2238-2247
-
(2002)
IEICE Trans. Fundam.
, vol.E85-A
, Issue.10
, pp. 2238-2247
-
-
Iwamoto, M.1
Yamamoto, H.2
-
32
-
-
0037411307
-
Visual cryptography for color images
-
Hou Y.C. Visual cryptography for color images. Pattern Recognition 36 7 (2003) 1619-1629
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1619-1629
-
-
Hou, Y.C.1
-
33
-
-
0346895379
-
-
A. Adhikari, S. Sikdar, A new (2, n)-visual threshold scheme for color images, INDOCRYPT 2003, Lecture Notes in Computer Science, vol. 2904, Springer, Berlin, 2003, pp. 148-161.
-
-
-
-
34
-
-
0442280816
-
New visual secret sharing schemes using probabilistic method
-
Yang C.N. New visual secret sharing schemes using probabilistic method. Pattern Recognition Lett. 25 4 (2004) 481-494
-
(2004)
Pattern Recognition Lett.
, vol.25
, Issue.4
, pp. 481-494
-
-
Yang, C.N.1
-
35
-
-
30444445435
-
Probabilistic visual cryptography schemes
-
Cimato S., De Prisco R., and De Santis A. Probabilistic visual cryptography schemes. Comput. J. 49 1 (2006) 97-107
-
(2006)
Comput. J.
, vol.49
, Issue.1
, pp. 97-107
-
-
Cimato, S.1
De Prisco, R.2
De Santis, A.3
|