Subject
Electrical and Electronic Engineering,Hardware and Architecture,Human-Computer Interaction
Reference23 articles.
1. Visual cryptography for general access structures;Ateniese;Inf. Comput.,1996
2. G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Constructions and bounds for visual cryptography, in: International Colloquium on Automata, Languages and Programming, 1996, pp. 96–012.
3. G.R. Blakley, Safeguarding cryptography keys, in: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, New York, USA, 1979, pp. 313–317.
4. T.H. Chen, K.H. Tsao, Image encryption by (n, n) random grids, in: Proceedings of 18th Information Security Conference, Hualien, Taiwan, 2008.
5. T.H. Chen, K.H. Tsao, K.C. Wei, Multiple-image encryption by rotating random grids, in: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008), Kaohsiung, Taiwan, 2008.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献