-
1
-
-
85062838317
-
-
G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 48, NJ, USA, 1979, pp. 313-317.
-
G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 48, NJ, USA, 1979, pp. 313-317.
-
-
-
-
2
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 22 1 (1979) 612-613
-
(1979)
Commun. ACM
, vol.22
, Issue.1
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
0035605439
-
A copyright protection scheme of images based on visual cryptography
-
Chang C.-C., and Wu H.-C. A copyright protection scheme of images based on visual cryptography. Imaging Sci. J. 49 (2001) 141-150
-
(2001)
Imaging Sci. J.
, vol.49
, pp. 141-150
-
-
Chang, C.-C.1
Wu, H.-C.2
-
5
-
-
14744284326
-
A new multi-secret images sharing scheme using largrange's interpolation
-
Feng J.-B., Wu H.-C., Tsai C.-S., and Chu Y.-P. A new multi-secret images sharing scheme using largrange's interpolation. J. Syst. Software 76 (2005) 327-339
-
(2005)
J. Syst. Software
, vol.76
, pp. 327-339
-
-
Feng, J.-B.1
Wu, H.-C.2
Tsai, C.-S.3
Chu, Y.-P.4
-
6
-
-
23044529190
-
-
C.-S. Tsai, C.-C. Chang, A generalized secret image sharing and recovery scheme, in: Advanced in Multimedia Information Processing-PCM2001, Lecture Notes in Computer Science, Springer, Germany, vol. 2195, 2001, pp. 963-968.
-
C.-S. Tsai, C.-C. Chang, A generalized secret image sharing and recovery scheme, in: Advanced in Multimedia Information Processing-PCM2001, Lecture Notes in Computer Science, Springer, Germany, vol. 2195, 2001, pp. 963-968.
-
-
-
-
7
-
-
10444226634
-
A new repeating color watermarking scheme based on human visual model
-
Tsai C.-S., and Chang C.-C. A new repeating color watermarking scheme based on human visual model. Eurasip J. Appl. Signal Process. 13 (2004) 1965-1972
-
(2004)
Eurasip J. Appl. Signal Process.
, vol.13
, pp. 1965-1972
-
-
Tsai, C.-S.1
Chang, C.-C.2
-
8
-
-
0347927730
-
Sharing multiple secrets in digital images
-
Tsai C.-S., Chang C.-C., and Chen T.-S. Sharing multiple secrets in digital images. J. Syst. Software 64 2 (2002) 163-170
-
(2002)
J. Syst. Software
, vol.64
, Issue.2
, pp. 163-170
-
-
Tsai, C.-S.1
Chang, C.-C.2
Chen, T.-S.3
-
9
-
-
0345060338
-
Improved non-repudiable threshold proxy signature scheme with known signers
-
Tsai C.-S., Tzeng S.-F., and Hwang M.-S. Improved non-repudiable threshold proxy signature scheme with known signers. Informatica 14 3 (2003) 393-402
-
(2003)
Informatica
, vol.14
, Issue.3
, pp. 393-402
-
-
Tsai, C.-S.1
Tzeng, S.-F.2
Hwang, M.-S.3
-
10
-
-
1642274444
-
Hiding digital watermarks using fractal compression technique
-
Wu H.-C., and Chang C.-C. Hiding digital watermarks using fractal compression technique. Fundam. Inf. 58 (2003) 189-202
-
(2003)
Fundam. Inf.
, vol.58
, pp. 189-202
-
-
Wu, H.-C.1
Chang, C.-C.2
-
11
-
-
0347927731
-
Detection and restoration of tampered JPEG compressed images
-
Wu H.-C., and Chang C.-C. Detection and restoration of tampered JPEG compressed images. J. Syst. Software 64 (2002) 151-161
-
(2002)
J. Syst. Software
, vol.64
, pp. 151-161
-
-
Wu, H.-C.1
Chang, C.-C.2
-
12
-
-
84926193517
-
-
M. Naor, A. Shamir, Visual cryptography in: Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Springer, Germany, vol. 950, 1995, pp. 1-12.
-
M. Naor, A. Shamir, Visual cryptography in: Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Springer, Germany, vol. 950, 1995, pp. 1-12.
-
-
-
-
13
-
-
0035123204
-
On the practical secret sharing scheme
-
Koga W. On the practical secret sharing scheme. IEICE Trans. Fundam. E84-A 1 (2001) 256-261
-
(2001)
IEICE Trans. Fundam.
, vol.E84-A
, Issue.1
, pp. 256-261
-
-
Koga, W.1
-
14
-
-
84978983299
-
-
M. Naor, A. Shamir, Visual cryptography II: improving the contrast via the cover base, in: Security Protocols, Lecture Notes in Computer Science, Springer, Germany, vol. 1189, April 1996, pp. 197-202.
-
M. Naor, A. Shamir, Visual cryptography II: improving the contrast via the cover base, in: Security Protocols, Lecture Notes in Computer Science, Springer, Germany, vol. 1189, April 1996, pp. 197-202.
-
-
-
-
15
-
-
0033078023
-
Visual cryptography and threshold schemes
-
Stinson D. Visual cryptography and threshold schemes. Potentials of IEEE 18 1 (1999) 13-16
-
(1999)
Potentials of IEEE
, vol.18
, Issue.1
, pp. 13-16
-
-
Stinson, D.1
-
16
-
-
0000049121
-
Constructions and properties of k-out-of-n visual secret sharing scheme
-
Verheul E.R., and van Tilborg H.C.A. Constructions and properties of k-out-of-n visual secret sharing scheme. Des. Codes Cryptography 1 2 (1997) 179-196
-
(1997)
Des. Codes Cryptography
, vol.1
, Issue.2
, pp. 179-196
-
-
Verheul, E.R.1
van Tilborg, H.C.A.2
-
17
-
-
0002015048
-
Visual cryptography for general access structures
-
Ateniese G., Blundo C., De Santis A., and Stinson D.R. Visual cryptography for general access structures. Info. Comput. 129 2 (1996) 86-106
-
(1996)
Info. Comput.
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
18
-
-
0036825941
-
The optimal n-out-of-n visual secret sharing scheme for gray-scale images
-
Iwamoto M., and Yamamoto H. The optimal n-out-of-n visual secret sharing scheme for gray-scale images. IEICE Trans. Fundam. E86-A 10 (2003) 2238-2247
-
(2003)
IEICE Trans. Fundam.
, vol.E86-A
, Issue.10
, pp. 2238-2247
-
-
Iwamoto, M.1
Yamamoto, H.2
-
20
-
-
34249067468
-
-
S. Cimato, R. De Prisco, A. De Santis, Contrast optimal colored visual cryptography schemes, in: Proceedings of 2003 IEEE Information Theory Workshop, Paris, France, March-April 2003, pp. 139-142.
-
S. Cimato, R. De Prisco, A. De Santis, Contrast optimal colored visual cryptography schemes, in: Proceedings of 2003 IEEE Information Theory Workshop, Paris, France, March-April 2003, pp. 139-142.
-
-
-
-
21
-
-
0037411307
-
Visual cryptography for color images
-
Hou Y.-C. Visual cryptography for color images. Pattern Recognition 36 7 (2003) 1619-1629
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1619-1629
-
-
Hou, Y.-C.1
-
22
-
-
0036454464
-
New constructions of the lattice-based visual secret sharing scheme using mixture of colors
-
Ishihara T., and Koga H. New constructions of the lattice-based visual secret sharing scheme using mixture of colors. IEICE Trans. Fundam. E85-A 1 (2002) 158-166
-
(2002)
IEICE Trans. Fundam.
, vol.E85-A
, Issue.1
, pp. 158-166
-
-
Ishihara, T.1
Koga, H.2
-
23
-
-
0042978503
-
A visual secret sharing scheme for color images based on meanvalue-color mixing
-
Ishihara T., and Koga H. A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86-A 1 (2003) 194-197
-
(2003)
IEICE Trans. Fundam.
, vol.E86-A
, Issue.1
, pp. 194-197
-
-
Ishihara, T.1
Koga, H.2
-
24
-
-
0035119988
-
An analytic construction for the visual secret sharing scheme for color images
-
Koga H. An analytic construction for the visual secret sharing scheme for color images. IEICE Trans. Fundam. E84-A 1 (2001) 262-272
-
(2001)
IEICE Trans. Fundam.
, vol.E84-A
, Issue.1
, pp. 262-272
-
-
Koga, H.1
-
25
-
-
49449115287
-
-
V. Rijmen, B. Preneel, Efficient color visual encryption or shared colors of Benetton, in: EUROCRYPTO'96, Rump Session, Berlin, Germany, 1996.
-
V. Rijmen, B. Preneel, Efficient color visual encryption or shared colors of Benetton, in: EUROCRYPTO'96, Rump Session, Berlin, Germany, 1996.
-
-
-
-
26
-
-
0000793737
-
New colored visual secret sharing schemes
-
Tang C.-H., and Laih C.-S. New colored visual secret sharing schemes. Des. Code Cryptogr. 20 (2000) 325-335
-
(2000)
Des. Code Cryptogr.
, vol.20
, pp. 325-335
-
-
Tang, C.-H.1
Laih, C.-S.2
-
28
-
-
0242496289
-
A construction method of visual secret sharing schemes for plural secret images
-
Iwamoto M., and Yamamoto H. A construction method of visual secret sharing schemes for plural secret images. IEICE Trans. Fundam. E86-A 10 (2003) 2577-2588
-
(2003)
IEICE Trans. Fundam.
, vol.E86-A
, Issue.10
, pp. 2577-2588
-
-
Iwamoto, M.1
Yamamoto, H.2
-
29
-
-
0242498217
-
Extended visual cryptography for natural images
-
Nakajima M., and Yamaguchi Y. Extended visual cryptography for natural images. J. WSCG 10 2 (2002) 303-310
-
(2002)
J. WSCG
, vol.10
, Issue.2
, pp. 303-310
-
-
Nakajima, M.1
Yamaguchi, Y.2
-
30
-
-
49449088753
-
-
T.-S. Chen, J.-H. Shiesh, H.-W. Chen, Using circular shadow image and fixed angle segmentation for visual cryptography system, in: Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, Saga, Japan, March 2002, pp. 214-220.
-
T.-S. Chen, J.-H. Shiesh, H.-W. Chen, Using circular shadow image and fixed angle segmentation for visual cryptography system, in: Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, Saga, Japan, March 2002, pp. 214-220.
-
-
-
-
31
-
-
49449094850
-
-
L.-H. Chen, C.-C. Wu, A Study on Visual Cryptography, Master Thesis, National Chiao Tung University, Taiwan, ROC, 1998.
-
L.-H. Chen, C.-C. Wu, A Study on Visual Cryptography, Master Thesis, National Chiao Tung University, Taiwan, ROC, 1998.
-
-
-
-
32
-
-
2942672380
-
-
H.-C. Hsu, T.-S. Chen, Y.-H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp. 996-1001.
-
H.-C. Hsu, T.-S. Chen, Y.-H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp. 996-1001.
-
-
-
|