-
1
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the Association For Computing Machinery
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
0003038453
-
-
IEEE Press, New York
-
G. J. Simmons, An introduction to shared secret and/or shared control schemes and their application, Contemporary Cryptology, The Science of Information Integrity, IEEE Press, New York, pp. 441-497,1992.
-
(1992)
An Introduction to Shared Secret And/or Shared Control Schemes and Their Application, Contemporary Cryptology, the Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
5
-
-
0000708528
-
An explication of secret sharing schemes,Designs
-
D. R. Stinson, An explication of secret sharing schemes,Designs, Codes and Cryptography, vol. 2, pp. 35-390, 1992.
-
(1992)
Codes and Cryptography
, vol.2
, pp. 35-390
-
-
Stinson, D.R.1
-
6
-
-
0002015048
-
Visual cryptography for general access structures
-
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Visual cryptography for general access structures, Information Computation, vol. 129, no. 2, pp. 86-106, 1996.
-
(1996)
Information Computation
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
Santis, A.D.3
Stinson, D.R.4
-
7
-
-
0034899594
-
Extended capabilities for visual cryptography
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Extended capabilities for visual cryptography, Theoretical Computer Science, vol.250, pp.143-161, 2001.
-
(2001)
Theoretical Computer Science
, vol.250
, pp. 143-161
-
-
Ateniese, G.1
Blundo, C.2
de Santis, A.3
Stinson, D.R.4
-
8
-
-
0036794537
-
-
C. Thien, and J. C. Lin, Secret Image Sharing,Computers and Graphics, vol. 26, no. 1, pp. 765-770, 2002.
-
(2002)
Secret Image Sharing,Computers and Graphics
, vol.26
, Issue.1
, pp. 765-770
-
-
Thien, C.1
Lin, J.C.2
-
9
-
-
0347946754
-
An image-sharing method with user-friendly shadow images
-
C. C. Thien, and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits and System for Video Technology, vol. 13, no. 12, pp. 1161-1169, 2003.
-
(2003)
IEEE Trans. Circuits and System For Video Technology
, vol.13
, Issue.12
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
10
-
-
32844469722
-
Secret image sharing with smaller shadow images
-
R. Z. Wang, and C. H. Su, Secret image sharing with smaller shadow images, Pattern Recognition Letter, vol. 27, no. 6, pp. 551-555, 2006.
-
(2006)
Pattern Recognition Letter
, vol.27
, Issue.6
, pp. 551-555
-
-
Wang, R.Z.1
Su, C.H.2
-
11
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Y. S. Wu, C. C. Thien, and J. C. Lin, Sharing and hiding secret images with size constraint, Pattern Recognition, vol. 37, no. 7, pp. 1377-1385, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
12
-
-
1642635190
-
A new (t, n) threshold image hiding scheme for sharing a secret color image
-
C. C. Chang, and I. C. Lin, A new (t, n) threshold image hiding scheme for sharing a secret color image, Proc. of ICCT, Beijing, China, vol. 1, pp. 196-202, 2003.
-
(2003)
Proc. of ICCT, Beijing, China
, vol.1
, pp. 196-202
-
-
Chang, C.C.1
Lin, I.C.2
-
13
-
-
14744284326
-
A new multi-secret images sharing scheme using Largrange's interpolation
-
J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, A new multi-secret images sharing scheme using Largrange's interpolation, Journal of Systems and Software, vol. 76, no. 3, pp. 327-339, 2005.
-
(2005)
Journal of Systems and Software
, vol.76
, Issue.3
, pp. 327-339
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
Chu, Y.P.4
-
14
-
-
0037600743
-
Contrast-optimal k out of n secret sharing schemes in visual cryptography
-
T. Hofmeister, M. Krause, and H. U. Simon, Contrast-optimal k out of n secret sharing schemes in visual cryptography, Theoretical Computer Science, vol. 240, no. 2, pp. 471-485, 2000.
-
(2000)
Theoretical Computer Science
, vol.240
, Issue.2
, pp. 471-485
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.U.3
-
15
-
-
0000437895
-
On the contrast in visual cryptography schemes
-
C. Blundo, A. De Santis and D. R. Stinson, On the contrast in visual cryptography schemes, Journal of Cryptology, vol. 12, no. 4, pp. 261-289, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.4
, pp. 261-289
-
-
Blundo, C.1
de Santis, A.2
Stinson, D.R.3
-
16
-
-
0000793737
-
New colored visual secret sharing schemes
-
C. N. Yang, and C. S. Laih, New colored visual secret sharing schemes, Designs, Codes and Cryptography, vol. 20, no. 3, pp. 325-335, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.20
, Issue.3
, pp. 325-335
-
-
Yang, C.N.1
Laih, C.S.2
-
17
-
-
34249067468
-
Contrast optimal colored visual cryptography schemes
-
Paris, France
-
S. Cimato, R. De Prisco, and A. De Santis, Contrast optimal colored visual cryptography schemes, Proc. of IEEE Information Theory Workshop, Paris, France, pp. 139-142, 2003.
-
(2003)
Proc. of IEEE Information Theory Workshop
, pp. 139-142
-
-
Cimato, S.1
de Prisco, R.2
de Santis, A.3
-
18
-
-
0034326194
-
Visual cryptography for gray level images
-
C. Blundo, A. De Santis, and M. Naor, Visual cryptography for gray level images, Information Processing Letters, vol. 75, no. 6, pp. 255-259, 2000.
-
(2000)
Information Processing Letters
, vol.75
, Issue.6
, pp. 255-259
-
-
Blundo, C.1
de Santis, A.2
Naor, M.3
-
19
-
-
10044234541
-
Image size invariant visual cryptography
-
R. Ito, H. Kuwakado, and H. Tanaka, Image size invariant visual cryptography, IEICE Trans. Fundamentals, vol. E82-A, no. 10, pp. 2172-2177, 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.10
, pp. 2172-2177
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
20
-
-
30744474182
-
Cheating in visual cryptography
-
G. Horng, T. H. Chen, and D. S. Tsai, Cheating in visual cryptography, Designs, Codes, Cryptography, vol. 38, pp. 219-236, 2006.
-
(2006)
Designs, Codes, Cryptography
, vol.38
, pp. 219-236
-
-
Horng, G.1
Chen, T.H.2
Tsai, D.S.3
-
21
-
-
33847751502
-
Cheating prevention in visual cryptography
-
C. M. Hu, and W. G. Tzeng, Cheating prevention in visual cryptography, IEEE Trans. Image Processing, vol. 16, no. 1, pp. 36-45, 2007.
-
(2007)
IEEE Trans. Image Processing
, vol.16
, Issue.1
, pp. 36-45
-
-
Hu, C.M.1
Tzeng, W.G.2
-
22
-
-
34147183148
-
A cheating prevention scheme for binary visual cryptography with Homogeneous secret image
-
D. S. Tsai, T. H. Chen, and G. Horng, A cheating prevention scheme for binary visual cryptography with Homogeneous secret image,Pattern Recognition, vol. 40, no. 8, pp. 2356-2366, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2356-2366
-
-
Tsai, D.S.1
Chen, T.H.2
Horng, G.3
-
24
-
-
84958648410
-
Visual authentication and identification
-
M. Naor, and B. Pinkas, Visual authentication and identification, Proc. of advances in Cryptology, Lecture Notes in Computer Science, vol. 1294, pp. 322-336, 1997.
-
(1997)
Proc. of Advances In Cryptology, Lecture Notes In Computer Science
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
25
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
R. Lukac, and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, vol. 38, no. 5, pp. 767-772, 2005.
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
26
-
-
0347927730
-
Sharing multiple secrets in digital images
-
C. S. Tsai, C. C. Chang, and T. S. Chen, Sharing multiple secrets in digital images, The Journal of Systems and Software, vol. 64, pp. 163-170, 2002.
-
(2002)
The Journal of Systems and Software
, vol.64
, pp. 163-170
-
-
Tsai, C.S.1
Chang, C.C.2
Chen, T.S.3
-
27
-
-
0036605019
-
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
-
C. C. Chang, and J. C. Chang, An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letter, vol. 23, pp. 931-941, 2002.
-
(2002)
Pattern Recognition Letter
, vol.23
, pp. 931-941
-
-
Chang, C.C.1
Chang, J.C.2
-
28
-
-
34547689489
-
VCPSS: A two-in-one two decoding-options image sharing method combining visual cryptography and polynomial-style sharing (PSS) approaches
-
S. J. Lin, and J. C. Lin, VCPSS: A two-in-one two decoding-options image sharing method combining visual cryptography and polynomial-style sharing (PSS) approaches, Pattern Recognition, vol. 40, no. 12, pp. 3652-3666, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3652-3666
-
-
Lin, S.J.1
Lin, J.C.2
-
29
-
-
28044466183
-
Progressive color visual cryptography
-
D. Jin, W. Q. Yan, and M. S. Kankanhalli, Progressive color visual cryptography, Journal of Electronic Imaging, vol. 14, 2005.
-
(2005)
Journal of Electronic Imaging
, vol.14
-
-
Jin, D.1
Yan, W.Q.2
Kankanhalli, M.S.3
-
30
-
-
34249062353
-
Two secret sharing schemes based on boolean operations
-
D. Wang, L. Zhang, N. Ma, and X. Li, Two secret sharing schemes based on boolean operations, Pattern Recognition, vol. 40, pp. 2776-2785, 2007.
-
(2007)
Pattern Recognition
, vol.40
, pp. 2776-2785
-
-
Wang, D.1
Zhang, L.2
Ma, N.3
Li, X.4
-
31
-
-
33750007638
-
Cheating immune (2, n)-threshold visual secret sharing
-
R. D. Prisco, and A. D. Santis, Cheating immune (2, n)-threshold visual secret sharing, Proc. of Security and Cryptography for Networks, vol. 4116, pp. 216-228, 2006.
-
(2006)
Proc. of Security and Cryptography For Networks
, vol.4116
, pp. 216-228
-
-
Prisco, R.D.1
Santis, A.D.2
-
32
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
C. C. Lin, and W. H. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, 2004.
-
(2004)
Journal of Systems and Software
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
33
-
-
34248584507
-
Improvements of image sharing with steganography and authentication
-
C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, vol. 80, no. 7, pp. 1070-1076, 2007.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.7
, pp. 1070-1076
-
-
Yang, C.N.1
Chen, T.S.2
Yu, K.H.3
Wang, C.C.4
-
34
-
-
54349115361
-
A new image secret sharing scheme to identify cheaters
-
R. Zhao, J. J. Zhao, F. Dai, and F. Q. Zhao, A new image secret sharing scheme to identify cheaters,Computer Standards and Interfaces, vol. 31, no. 1, pp. 252-257, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.1
, pp. 252-257
-
-
Zhao, R.1
Zhao, J.J.2
Dai, F.3
Zhao, F.Q.4
-
35
-
-
45549098627
-
Sharing secrets in stego images with authentication
-
C. C. Chang, Y. P. Hsieh, and C. H. Lin: Sharing secrets in stego images with authentication, Pattern Recognition, vol. 41, no. 10, pp. 3130-3137, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.10
, pp. 3130-3137
-
-
Chang, C.C.1
Hsieh, Y.P.2
Lin, C.H.3
-
36
-
-
0030386584
-
Applications of toral automorphisms in image watermarking
-
Lausanne, Switzerland
-
G. Voyatzis, and I. Pitas, Applications of toral automorphisms in image watermarking, Proc. of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 2, pp. 237-240, 1996.
-
(1996)
Proc. of IEEE International Conference On Image Processing
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
37
-
-
65749311828
-
Visualizing toral automorphisms
-
G. Matthew, K. Bruce, and Z. George, Visualizing toral automorphisms, The Mathematical Intelligencer, vol. 15, no. 1, pp. 63-66, 2003.
-
(2003)
The Mathematical Intelligencer
, vol.15
, Issue.1
, pp. 63-66
-
-
Matthew, G.1
Bruce, K.2
George, Z.3
|