Citation: | Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang. XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385 |
付正欣, 郁滨, 房礼国. 一种新的多秘密分享视觉密码[J]. 电子学报, 2011, 39(3): 712-718.
|
Fu Zheng-xin, Yu Bin, and Fang Li-guo. A new multi-secret sharing visual cryptography[J]. Acta Electronica Sinica, 2011, 39(3): 712-718.
|
付正欣, 郁滨, 房礼国. 基于压缩算法的存取式多秘密视觉密码[J]. 电子与信息学报, 2013, 35(5): 1055-1062.
|
Fu Zheng-xin, Yu Bin, and Fang Li-guo. The access-based multi-secret visual cryptography with compression algorithm[J]. Journal of Electronics Information Technology, 2013, 35(5): 1055-1062.
|
Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72[U3](2): 1867-1886.
|
Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics Security, 2013, 8(5): 733-743.
|
Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662.
|
Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777.
|
Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329.
|
Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810.
|
Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463.
|
Chen Y C, Tsai D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamirs visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23[U4](8): 1225-1233.
|
Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt94, Berlin, 1995 (LNCS 950): 1-12.
|
Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
|
Tuyls P, Hollmann H D L, Lint J H V, et al.. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
|
Wang D S, Zhang L, Ma N, et al.. Two secret sharing schemes based on Boolean operations[J]. Pattern Recognition, 2007, 40(10): 2776-2785.
|
Liu F, Wu C, and Lin X. Step construction of visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 27-38.
|
Wu X and Sun W. Random grid-based visual secret sharing with abilities of OR and XOR decryptions[J]. The Journal of Visual Communication and Image Representation, 2013, 24[U5](1): 48-62.
|
Yang C and Wang D S. Property analysis of XOR based visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(2): 189-197.
|