-
1
-
-
0001875459
-
Visual Cryptography
-
Perugia, Italy, May 9-12 pp, Springer, Berlin
-
Naor, M. and Shamir, A. (1994) Visual Cryptography. Advances in Cryptology - EUROCRYPT'94, Perugia, Italy, May 9-12 pp. 1-12. Springer, Berlin.
-
(1994)
Advances in Cryptology - EUROCRYPT'94
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
2
-
-
0037233509
-
Visual cryptography for gray-level images by dithering techniques
-
Lin, C.C. and Tsai, W.H. (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recognit. Lett., 24, 349-358.
-
(2003)
Pattern Recognit. Lett
, vol.24
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
3
-
-
0037411307
-
Visual cryptography for color images
-
Hou, J.C. (2003) Visual cryptography for color images. Pattern Recognit., 36, 1619-1629.
-
(2003)
Pattern Recognit
, vol.36
, pp. 1619-1629
-
-
Hou, J.C.1
-
4
-
-
33244471538
-
Efficient visual secret sharing scheme for color images
-
Shyu, S.J. (2006) Efficient visual secret sharing scheme for color images. Pattern Recognit., 39, 866-880.
-
(2006)
Pattern Recognit
, vol.39
, pp. 866-880
-
-
Shyu, S.J.1
-
5
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
Lukac, R. and Plataniotis, K.N. (2005) Bit-level based secret sharing for image encryption. Pattern Recognit., 38, 767-772.
-
(2005)
Pattern Recognit
, vol.38
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
6
-
-
55449089633
-
-
Lukac, R. and Plataniotis, K.N. (2005) Image representation based secret sharing. Commun. CCISA, (Special issue on Visual Secret Sharing, CCISA, Taipei), 11, 103-114.
-
Lukac, R. and Plataniotis, K.N. (2005) Image representation based secret sharing. Commun. CCISA, (Special issue on Visual Secret Sharing, CCISA, Taipei), 11, 103-114.
-
-
-
-
7
-
-
28044466183
-
Progressive color visual cryptography
-
Jin, D., Yan, W.Q. and Kankanhalli, M.S. (2005) Progressive color visual cryptography. J. Electron. Imaging, 14, 033019.
-
(2005)
J. Electron. Imaging
, vol.14
, pp. 033019
-
-
Jin, D.1
Yan, W.Q.2
Kankanhalli, M.S.3
-
8
-
-
0141741345
-
Secret image sharing with capability of share data reduction
-
Lin, C.C. and Tsai, W.H. (2005) Secret image sharing with capability of share data reduction. Opt. Eng., 42, 2340-2345.
-
(2005)
Opt. Eng
, vol.42
, pp. 2340-2345
-
-
Lin, C.C.1
Tsai, W.H.2
-
9
-
-
84958770384
-
Almost Ideal Contrast Visual Cryptography with Reversing
-
San Francisco, CA, USA, February 23-27, pp, Springer, Berlin
-
Viet, D.Q. and Kurosawa, K. (2004) Almost Ideal Contrast Visual Cryptography with Reversing. Proceeding of Topics in Cryptology - CT-RSA2004, San Francisco, CA, USA, February 23-27, pp. 353-365. Springer, Berlin.
-
(2004)
Proceeding of Topics in Cryptology - CT-RSA2004
, pp. 353-365
-
-
Viet, D.Q.1
Kurosawa, K.2
-
10
-
-
25444452129
-
Ideal contrast visual cryptography schemes with reversing
-
Cimato, S., De Santis, A., Ferrara, A.L. and Masucci, B. (2005) Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett., 93, 199-206.
-
(2005)
Inf. Process. Lett
, vol.93
, pp. 199-206
-
-
Cimato, S.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
11
-
-
0442280816
-
New visual secret sharing schemes using probabilistic method
-
Yang, C.N. (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett., 25, 481-494.
-
(2004)
Pattern Recognit. Lett
, vol.25
, pp. 481-494
-
-
Yang, C.N.1
-
12
-
-
10044234541
-
Image size invariant visual cryptography
-
Ito, R., Kuwakado, H. and Tanaka, H. (1999) Image size invariant visual cryptography. IEICE Trans. Fundam., E82-A, 2172-2177.
-
(1999)
IEICE Trans. Fundam
, vol.E82-A
, pp. 2172-2177
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
13
-
-
30444445435
-
Probabilistic visual cryptography schemes
-
Cimato, S., De Prisco, R. and De Santis, A. (2006) Probabilistic visual cryptography schemes. Comput. J., 49, 97-107.
-
(2006)
Comput. J
, vol.49
, pp. 97-107
-
-
Cimato, S.1
De Prisco, R.2
De Santis, A.3
-
14
-
-
30744474182
-
Cheating in visual cryptography
-
Horng, G., Chen, T.H. and Tsai, D.S. (2006) Cheating in visual cryptography. Des. Codes Cryptogr., 38, 219-236.
-
(2006)
Des. Codes Cryptogr
, vol.38
, pp. 219-236
-
-
Horng, G.1
Chen, T.H.2
Tsai, D.S.3
-
15
-
-
34147183148
-
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
-
Tsai, D.S., Chen, T.H. and Horng, G. (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit., 40, 2356-2366.
-
(2007)
Pattern Recognit
, vol.40
, pp. 2356-2366
-
-
Tsai, D.S.1
Chen, T.H.2
Horng, G.3
-
16
-
-
1642601966
-
Randomness in secret sharing and visual cryptography schemes
-
De Bonis, A. and De Santis, A. (2004) Randomness in secret sharing and visual cryptography schemes. Theoret. Comput. Sci., 314, 351-374.
-
(2004)
Theoret. Comput. Sci
, vol.314
, pp. 351-374
-
-
De Bonis, A.1
De Santis, A.2
-
17
-
-
23944476296
-
XOR-based visual cryptography schemes
-
Tuyls, P., Hollmann, H.D.L., Van Lint, J.H. and Tolhuizen, L. (2005) XOR-based visual cryptography schemes. Des. Codes Cryptogr., 37 169-186.
-
(2005)
Des. Codes Cryptogr
, vol.37
, pp. 169-186
-
-
Tuyls, P.1
Hollmann, H.D.L.2
Van Lint, J.H.3
Tolhuizen, L.4
-
18
-
-
10044234907
-
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
-
Yang, C.N. and Chen, T.S. (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognit. Lett. 26, 193-206.
-
(2005)
Pattern Recognit. Lett
, vol.26
, pp. 193-206
-
-
Yang, C.N.1
Chen, T.S.2
-
19
-
-
33646098909
-
Reduce shadow size in aspect ratio Invariant visual secret sharing schemes using a square block-wise operation
-
Yang, C.N. and Chen, T.S. (2006) Reduce shadow size in aspect ratio Invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognit., 39, 1300-1314.
-
(2006)
Pattern Recognit
, vol.39
, pp. 1300-1314
-
-
Yang, C.N.1
Chen, T.S.2
-
20
-
-
84955558118
-
Limiting the Visible Space Visual Secret Sharing Schemes and their Application to Human Identification
-
Kyongju, Korea, November 25, pp, Springer, Berlin
-
Kobara, K. and Imai, H. (1996) Limiting the Visible Space Visual Secret Sharing Schemes and their Application to Human Identification. Asiacrypt '96, Kyongju, Korea, November 25, pp. 185-195. Springer, Berlin.
-
(1996)
Asiacrypt '96
, pp. 185-195
-
-
Kobara, K.1
Imai, H.2
-
21
-
-
31244437258
-
Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels
-
Eisen, P.A. and Stinson, D.R. (2002) Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Cryptogr., 25, 15-61.
-
(2002)
Des. Codes Cryptogr
, vol.25
, pp. 15-61
-
-
Eisen, P.A.1
Stinson, D.R.2
-
22
-
-
0035546454
-
Improved schemes for visual cryptography
-
Blundo, C., De Bonis, A. and De Santis, A. (2001) Improved schemes for visual cryptography. Des. Codes Cryptogr., 24, 255-278.
-
(2001)
Des. Codes Cryptogr
, vol.24
, pp. 255-278
-
-
Blundo, C.1
De Bonis, A.2
De Santis, A.3
|