共 32 条
[1]
Ateniese G(1996)Visual cryptography for general access structures Inf Comput 129 86-106
[2]
Blundo C(2009)Secret image sharing: a boolean-operations -based approach combining benefits of polynomial-based and fast approaches Int J Pattern Recognit Artif Intell 23 263-285
[3]
Santis AD(2017)Fully incrementing visual cryptography from a succinct non-monotonic structure IEEE Transactions on Information Forensics & Security 12 1082-1091
[4]
Stinson DR(2014)Optimal pixel expansion of deterministic visual cryptography scheme Multimedia Tools & Applications 73 1177-1193
[5]
Chao K(2010)Step construction of visual cryptography schemes IEEE Transactions on Information Forensics & Security 5 27-38
[6]
Lin J(2016)From action to activity: sensor-based activity recognition Neurocomputing 181 108-115
[7]
Chen YC(1995)Visual cryptography LNCS 950 1-12
[8]
Fu Z(2015)Minimizing pixel expansion in visual cryptographic scheme for general access structures IEEE Transactions on Circuits & Systems for Video Technology 25 1557-1561
[9]
Yu B(2005)Xor-based visual cryptography schemes Designs Codes & Cryptography 37 169-186
[10]
Liu F(2007)Two secret sharing schemes based on boolean operations Pattern Recogn 40 2776-2785