Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference28 articles.
1. M. Naor, A. Shamir, Visual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS, vol 950 (1994), pp. 1–12.
2. L.S. Hill, Cryptography in an algebraic alphabet. Am. Math. Mon. 36(6), 306–312 (1929).
3. L.S. Hill, Concerning certain linear transformation apparatus of cryptography. Am. Math. Mon. 38, 135–154 (1931).
4. Z. Shao, Y. Shang, R. Zeng, H. Shu, G. Coatrieux, J. Wu, Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process. Image Commun. 48, 12–21 (2016).
5. S. Cimato, R. De Prisco, A. De Santis, Optimal colored threshold visual cryptography schemes. Des. Codes Cryptography 35, 311–335 (2005).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献