Author:
Chen Yu-Chi,Tsai Du-Shiau,Horng Gwoboa
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Media Technology,Signal Processing
Reference18 articles.
1. Visual cryptography;Naor,1994
2. How to share a secret;Shamir;Comm. ACM,1979
3. G. Blakley, Safeguarding cryptographic keys, in: Proceedings of AFIPS 1979 National Conference, 1979.
4. A. Shamir, M. Naor, Visual Cryptography II: Improving the Contrast via the Cover Base, Security in Communication Networks, September 16–17, 1996.
5. Contrast optimal threshold visual cryptography schemes;Blundo;SIAM J. Discrete Math.,2003
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献