共 11 条
- [1] Chang CC, 2002, FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, P230, DOI 10.1109/CW.2002.1180884
- [2] Kang I, 2009, INT CONF ACOUST SPEE, P1473, DOI 10.1109/ICASSP.2009.4959873
- [5] Liu YF, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), P746
- [6] Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
- [7] Sahai Gazal, 2005, P 11 NAT C COMM NCC
- [8] Shikha sharda Sumit, 2013, INT J COMPUTER APPL, V69
- [9] Color Visual Cryptography Scheme Using Meaningful Shares [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 173 - +
- [10] An improved Visual Cryptography scheme for secret hiding [J]. 2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +