Blakley G R. Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference, NJ, USA,1979, 48: 242-268.[2]Shamir A. How to share a secret[J]. Communications of theACM, 1979, 22(11): 612-613.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances inCryptology-Eurocrypt94, Berlin.1995, LNCS 950:1-12[4]Ateniese G, Blundo C, De Santis A, and Stinson D R. Visualcryptography for general access structures[J].Informationand Computation.1996, 129(2):86-106[5]Tuyls P, Hollmann H D L, Lint J H V, and Tolhuizen L.XOR-based visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 37(1):169-186[6]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n)visual threshold scheme[C]. 1st International Symposium onPervasive Computing and Applications Proceedings(SPCA06), Ningbo, 2006: 856-860.[7]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. VisualCryptography (VC) with non-expanded shadow imagesHilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[8]Yang Ching-nung, Wang Chung-chun, and Chen Tse-shih.Visual cryptography schemes with reversing[J]. TheComputer Journal, 2008, bxm118: 1-13.[9]Lin Chang-chou and Tai Wen-hsiang. Visual cryptographyfor gray-level images by dithering techniques[J]. PatternRecognition Letters, 2003, 24(1-3): 349-358.[10]Cimato S, De Prisco R, and De Santis A. Optimal coloredthreshold visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 35(3):311-335[11]Yang Ching-nung and Chen Tse-shih. Colored visualcryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[12]Ng F Y and Wong D S. On the security of a visualcryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[13]Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharingthreshold visual cryptography scheme[C]. 2007 InternationalConference on Computational Intelligence and Security(CIS2007), Harbin, 2007: 815-818.[14]Chen L H and Wu C C. A study on visual cryptography[D].[Master Thesis], National Chiao Tung University, Taiwan,1998.[15]Hsu H C.[J].Chen T S, and Lin Y H. The ring shadow imagetechnology of visual cryptography by applying diverserotating angles to hide the secret sharing[C]. Proceedings ofthe 2004 IEEE International Conference on Networking,Sensing Control, Taipei, Taiwan.2004,:-[16]Feng Jen-bang, Wub Hsien-chu, and Tsaic Chwei-shyong, etal.. Visual secret sharing for multiple secrets[J]. PatternRecognition, 2008, 41(12): 3572-3581.
|