Zitieren

1. Blakely, G. R. Safeguarding Cryptography Keys. - In: Proc. of AFIPS National Computer Conference, Vol. 48, 1979, 313-317.Search in Google Scholar

2. Shamir, A. How to Share a Secret. - Communications of the ACM, Vol. 22, 1979, No 11, 612613.10.1145/359168.359176Search in Google Scholar

3. Thien, C. C., J. C. Li n. Secret Image Sharing. - Computer Graphics, Vol. 26, 2002, No 5, 765770.10.1016/S0097-8493(02)00131-0Search in Google Scholar

4. Thien, C. C., J. C. Lin. An Image-Sharing Method with User-Friendly Shadow Images. - IEEE Transactions on Circuit System, Vol. 13, 2003, No 12, 1161-1169.10.1109/TCSVT.2003.819176Search in Google Scholar

5. Chang, C. C., I. C. Lin. A New (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image. - In: Proc. of ICCT'2003, Vol. 1, 2003, 196-202.Search in Google Scholar

6. Wang, R. Z., C. H. Su. Secret Image Sharing with Smaller Shadow Images. - Pattern Recognition Letter, Vol. 27, 2006, No 6, 551-555.10.1016/j.patrec.2005.09.021Search in Google Scholar

7. Wang, R. Z., S. J. Shyu. Scalable Secret Image Sharing. - Signal Processing: Image Communication, Vol. 22, 2007, No 4, 263-373.10.1016/j.image.2006.12.012Search in Google Scholar

8. Lin, Y. Y., R. Z. Wang. Scalable Secret Image Sharing with Smaller Shadow Images. - IEEE Signal Processing Letters, Vol. 17, March 2010, No 3, 316-319.10.1109/LSP.2009.2038113Search in Google Scholar

9. Naor, M., A. Shamir. Visual Cryptography. - In: Proc. of the Advances in Cryptology-Eurocrypt'94. Lecture Notes in Computer Science, Vol. 950, 1995, 1-12.10.1007/BFb0053419Search in Google Scholar

10. Blundo, C., A. D. Santis, D. R. Stinson. On the Contrast in Visual Cryptography Schemes. - Journal of Cryptology, Vol. 12, 1999, No 4, 261-289.10.1007/s001459900057Search in Google Scholar

11. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. - Pattern Recognition Letters, Vol. 25, 2004, No 4, 481-494.10.1016/j.patrec.2003.12.011Search in Google Scholar

12. Yang, C. N., T. S. Chen. Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion. - Pattern Recognition Letters, Vol. 26, 2005, No 2, 193-206.10.1016/j.patrec.2004.08.025Search in Google Scholar

13. Shyu, S. J., S. Y. Huang, Y. K. Lee, R. Z. Wang. Sharing Multiple Secrets in Visual Cryptography. - Pattern Recognition, Vol. 40, 2007, No 12, 3633-3651.10.1016/j.patcog.2007.03.012Search in Google Scholar

14. Wang, D., L. Zhang, N. Ma, X. Li. Two Secret Sharing Schemes Based on Boolean Operations. - Pattern Recognition, Vol. 40, 2007, No 10, 2776-2785.10.1016/j.patcog.2006.11.018Search in Google Scholar

15. Chen, T.-H., C.-S. Wu. Efficient Multi-Secret Image Sharing Based on Boolean Operations. -Journal of Signal Processing, Vol. 91, 2011, 90-97.10.1016/j.sigpro.2010.06.012Search in Google Scholar

16. W u. A Secret Image Sharing Scheme for Light Images. - EURASIP Journal on Advances in Signal Processing, 2013.10.1186/1687-6180-2013-49Search in Google Scholar

17. Chang, C-C., Chia-Chen Linc, T. Hoang Ngan Led, Hoai Bac Le. Sharing a Verifiable Secret Image Using Two Shadows. - Pattern Recognition, Vol. 42, November 2009, Issue 11, 3097-3114.10.1016/j.patcog.2009.04.012Search in Google Scholar

18. Liu, H., X. Wang, A. K a d i r. Image Encryption Using DNA Complementary Rule and Chaotic Maps. - Applied Soft Computing, Vol. 12, 2012, 1457-1466.10.1016/j.asoc.2012.01.016Search in Google Scholar

19. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyper-Chaotic Sequences. -Optics Communications, Vol. 285, 2012, No 1, 29-37.10.1016/j.optcom.2011.08.079Search in Google Scholar

20. Wade, T., C. L. Washington. Introduction to Cryptography with Coding Theory. Pearson, August 2005.Search in Google Scholar

eISSN:
1314-4081
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik