共 20 条
[1]
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
[2]
Blakley G.R., Safeguarding ciyptographic keys, Proceedings of the AFIPS National Computer Conference, 1, pp. 313-317, (1979)
[3]
Naor M., Shamir A., Visual cryptography, Advances in Cryptology - EUROCRYPT'94. Lecnire Notes in Computer Science, 950, pp. 1-12, (1995)
[4]
Ateniese G., Blundo C, De Santis A., Stinson D.R., Visual ciyptography for general access structures, Information and Computation, 129, 2, pp. 86-106, (1996)
[5]
Blundo. C, Stinson D.R., On the contrast in visual cryptography schemes, Journal of Cryptology, 12, 4, pp. 261-289, (1999)
[6]
Hofmeister T., Krause M., Simon H.U., Contrast-optimal k out of n secret sharing schemes in visual ciyptography, Theoretical Computer Science, 240, 2, pp. 471-485, (2000)
[7]
Jin D, Yan W.Q., Kankanhalli M.S., Progressive color visual cryptography, Journal of Electronic Imaging, 14, 3, (2005)
[8]
Lin J.C., Secret image sharing, Comput. Graphics, 26, 5, pp. 765-770, (2002)
[9]
Lin C.C., Tsai W.H., Secret image sharing with steganography and authentication, Journal of Systems and Software, 73, 3, pp. 405-414, (2004)
[10]
Yang C.N., Chen T.S., Yu K.H., Wang C.C., Improvements of image sharing with steganography and authentication, Journal of Systems and Software, 80, 7, pp. 1070-1076, (2007)