Author:
Le T. Hoang Ngan,Lin Chia-Chen,Chang Chin-Chen,Le Hoai Bac
Subject
Electrical and Electronic Engineering,Signal Processing,Artificial Intelligence,Applied Mathematics,Computer Vision and Pattern Recognition,Statistics, Probability and Uncertainty,Computational Theory and Mathematics
Reference22 articles.
1. G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings, New York, USA, June 1979, pp. 313–317.
2. How to share a secret;Shamir;Communications of ACM,1979
3. M. Noar, A. Shamir, Visual cryptography, in: Advances in Cryptology – Eurocryptʼ94, in: Lecture Notes in Computer Science, vol. 950, 1995, pp. 1–12.
4. M. Iwamoto, H. Yamamoto, The optimal n-out-of-n visual secret sharing scheme for grayscale images, in: IEICE Transactions Fundamentals, E85-A, vol. 10, 2002, pp. 2238–2247.
5. A new (2, n)-visual threshold scheme for color images;Adhikari,2003
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献