Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-613[2]Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, NJ, USA, 1979, 48: 242-268.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances in Cryptology-Eurocrypt94, Lecture Notes in Computer Science.1995, 950:1-12[4]Ateniese G, Carlo B, and Santis A D, et al.. Visual cryptography for general access structures[J].Information and Computation.1996, 129(2):86-106[5]Steve L, Daniel M, and Rafail O. Visual Cryptography on Graphs[C]. COCOON 2008, LNCS 5092: 225-234.[6]Boundo C, Santis A D, and Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptography, 1999, 12(4): 261-289.[7]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.[8]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[9]Cimato S, De Prisco R, and De Santis A. Optimal colored threshold visual cryptography schemes[J].Designs, Codes and Cryptography.2005, 35(3):311-335[10]Yang Ching-nung and Chen Tse-shih. Colored visual cryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[11]Ng F Y and Wong D S. On the security of a visual cryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[12]Wu H C and Chang C C. Sharing visual multi-secrets using circle shares[J].Computer Standards Interfaces.2005, 134(28):123-135[13]Yu B, Fu Z X, and Fang L G. A modified multi-secret sharing visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 351-354.[14]Fu Z X and Yu B. Research on rotation visual cryptography scheme[C]. International symposium on information engineering and electronic commerce, IEEE, Ternopil, Ukraine, 2009: 533-536.[15]陈玲慧. 视觉化密码之研究及其应用. 中国台湾专题研究计划成果报告, 计划编号:NSC 89-2213-E-009-016, 1999.[16]Chen Ling-hui. A study on visual cryptography and its applications. NSC 89-2213-E-009-016, 1999.[17]郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J]. 计算机工程,2005, 31(6): 126-128.Guo Jie, Yan Hao, Liu Yan, and Chen Ke-fei. A cheater detectable visual cryptography scheme[J]. Computer Engineering, 2005, 31(6): 126-128.[18]徐晓辉,郁滨. 无重影的可防欺骗视觉密码方案[C].全国第18届计算机技术与应用学术会议(CACIS2007), 宁波, 2007: 1335-1339.[19]Xu Xiao-hui and Yu Bin. A cheater detectable VCS without fringes[C]. CACIS2007, Ningbo, 2007: 1335-1339.[20]Gwoboa H, Tzungher C, and Dushiau T. Cheating in visual cryptography[J].Designs, Codes and Cryptography.2006, 38(2):219-236[21]王益伟,郁滨. 一种(k', k, n)可防欺骗视觉密码方案[C]. 全国第19届计算机技术与应用学术会议(CACIS08), 合肥, 2008: 492-496.[22]Wang Yi-wei and Yu Bin. A (k',k,n)-cheater prevention VCS[C], CACIS08, Hefei, 2008: 492-496.Yu B, Fang L G, and Xu X H. A Verifiable visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 347-350.
|