共 11 条
[1]
Chang CC, 2002, FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, P230, DOI 10.1109/CW.2002.1180884
[2]
Kang I, 2009, INT CONF ACOUST SPEE, P1473, DOI 10.1109/ICASSP.2009.4959873
[5]
Liu YF, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), P746
[6]
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
[7]
Sahai Gazal, 2005, P 11 NAT C COMM NCC
[8]
Shikha sharda Sumit, 2013, INT J COMPUTER APPL, V69
[9]
Color Visual Cryptography Scheme Using Meaningful Shares
[J].
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS,
2008,
:173-+
[10]
An improved Visual Cryptography scheme for secret hiding
[J].
2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS,
2006,
:340-+