共 12 条
- [1] Naor M., Shamir A., Visual cryptography, Eurocrypt'94, 950, pp. 1-12, (1995)
- [2] Ross A., Othman A.A., Visual cryptography for biometric privacy, IEEE Trans. Inf. Forensics Security, 6, 1, pp. 70-81, (2011)
- [3] Askari N., Moloney C., Heys H.M., A novel visual secret sharing scheme without image size expansion, Proc. 25th IEEE Canadian Conf. Electr. Comput. Eng. (CCECE), pp. 1-4, (2012)
- [4] Wu C.C., Chen L.H., A Study on Visual Cryptography, (1998)
- [5] Feng J.B., Wu G.C., Tsai C.S., Chang Y.F., Chu Y.P., Visual secret sharing for multiple secrets, Pattern Recognit., 41, 12, pp. 3572-3581, (2008)
- [6] Wu H.C., Chang C.C., Sharing visual multi-secrets using circle shares, Comput. Standards Inter., 28, 1, pp. 123-135, (2005)
- [7] Ateniese G., Blundo C., De Santis A., Stinson D.R., Extended capabilities for visual cryptography, Theoretical Comput. Sci., 250, 1-2, pp. 143-161, (2001)
- [8] Floyd R.W., Steinberg L., An adaptive algorithm for spatial gray scale, Proc. Soc. Inform. Display, 17, 2, pp. 75-77, (1976)
- [9] Zhou Z., Arce G.R., Crescenzo G.D., Halftone visual cryptography, IEEE Trans. Image Process, 15, 8, pp. 2441-2453, (2006)
- [10] Nakajima M., Yamaguchi Y., Extended visual cryptography for natural images, Proc. WSCG, pp. 303-310, (2002)