共 13 条
[1]
Beinel A., Livne N., Paclro C., Theory of cryptography: Ideal secret sharing, In Proceeding of the Third Theory of Cryptography Conference, 514, pp. 13-21, (2006)
[2]
Chen Y.F., Chan Y.K., Huang C.C., Tsal M.H., Chu Y.P., A multiple-level visual secret-sharing scheme without image size expansion, Journal of Information Sciences, Science Direct, 177, 21, pp. 4696-4710, (2007)
[3]
Rukhin A., Et al., A Statistical Test Suite for Random and Pseudo random Number Generators for Cryptographic Applications, National Institute of Standards and Technology, (2001)
[4]
Li B., A reliable (k, n) Image Secret Sharing Scheme, In Proceeding of the 2nd IEEE International Conference On Autonomic and Secure Computing, pp. 15-24, (2006)
[5]
Lukac R., Plataniotis K.N., Level based secret sharing for image encryption, Journal of Pattern Recognition,Elsevier, 38, 5, pp. 767-772, (2005)
[6]
Naor M., Shamir A., Visual cryptography, In Proceedings of Advances In Cryptography 94, LNCS, 950, pp. 1-12, (1995)
[7]
Fang W.-P., Visual cryptography in reversible style, In Proceeding of the Third IEEE International Conference On Hiding and Multimedia Signal Processing, pp. 11-28, (2007)
[8]
Lin C.-C., Tsai W.-H., Secret image sharing with steganography and authentication, Journal of System and Software,Elsevier, 73, pp. 405-414, (2004)
[9]
Fang W.P., Non -expansion visual secret sharing in reversible style, IJCSNS International Journal of Computer Science and Network Security, 2, (2009)
[10]
Yu-Shan W., Thien C.-C., Lin J.-C., Sharing and Hiding Secret Images with Size Constraint, Journal of Pattern Recognition, Elsevier, 37, pp. 1377-1385, (2004)