共 21 条
[12]
Ito R, 1999, IEICE T FUND ELECTR, VE82A, P2172
[13]
Kawai T., 1999, P IEEE SYST MAN CYB, V2, P969
[14]
Kwon T, 2000, IEICE T COMMUN, VE83B, P2044
[15]
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
[16]
National Bureau of Standards (U.S.), 1997, FED INF PROC STAND P, V46
[17]
Oka K., 1996, IEICE T, V9, P1624
[18]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[19]
A new approach for visual cryptography
[J].
DESIGNS CODES AND CRYPTOGRAPHY,
2002, 27 (03)
:207-227
[20]
Wong PW, 2001, IEEE T IMAGE PROCESS, V10, P1593, DOI 10.1109/83.951543