共 12 条
[1]
Adhikari A, 2003, LECT NOTES COMPUT SC, V2904, P148
[2]
Bin Yu, 2008, 2008 International Conference on Computational Intelligence and Security, P351, DOI 10.1109/CIS.2008.120
[4]
On visual cryptography schemes
[J].
1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND,
1998,
:154-155
[5]
Hwang RJ., 2000, TAMKANG J SCI ENG, V3, P97
[6]
Naor M., 1995, WORKSHOP THEORY APPL, V950, P1, DOI DOI 10.1007/BFB0053419
[7]
Rao Y. V. Subba, 2008, FINGERPRINT BASED AU, P19
[8]
Sang-Yi Yi, 1999, Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464), P817, DOI 10.1109/CLEOPR.1999.817849
[9]
Sharing multiple secrets in visual cryptography
[J].
PATTERN RECOGNITION,
2007, 40 (12)
:3633-3651