共 17 条
[1]
Fu Z.-X., Yu B., Fang L.-G., A new multi-secret sharing visual cryptography, Acta Electronica Sinica, 39, 3, pp. 712-718, (2011)
[2]
Fu Z.-X., Yu B., Fang L.-G., The access-based multi-secret visual cryptography with compression algorithm, Journal of Electronics & Information Technology, 35, 5, pp. 1055-1062, (2013)
[3]
Yu B., Shen G., Multi-secret visual cryptography with deterministic contrast, Multimedia Tools and Applications, 72, 2, pp. 1867-1886, (2014)
[4]
Shyu S.J., Jiang H.W., General constructions for threshold multiple-secret visual cryptography schemes, IEEE Transactions on Information Forensics Security, 8, 5, pp. 733-743, (2013)
[5]
Wang R.Z., Region incrementing visual cryptography, IEEE Signal Processing Letters, 16, 8, pp. 659-662, (2009)
[6]
Shyu S.J., Jiang H.W., Efficient construction for region incrementing visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology, 22, 5, pp. 769-777, (2012)
[7]
Yang C.N., Shih H.W., Chu Y.Y., Et al., New region incrementing visual cryptography scheme, Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, pp. 323-329, (2011)
[8]
Yang C.N., Shih H.W., Wu C.C., Et al., k out of n region incrementing scheme in visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology, 22, 5, pp. 799-810, (2012)
[9]
Yang C.N., Lin Y.C., Wu C.C., Region-in-Region incrementing visual cryptography scheme, Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, pp. 449-463, (2013)
[10]
Chen Y.C., Tsai D.S., Horng G., A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography, The Journal of Visual Communication and Image Representation, 23, 8, pp. 1225-1233, (2012)