|
[ATEN01] G. Ateniese, C. Blundo, A. Santis, D. Stinson, “Extended capabilities for visual cryptography,” Theor. Comput. Sci., vol.250, 143-161, 2001. [ATEN96] G. Ateniese, C. Blundo, “A. De Santis, D. Stinson,” Visual cryptography for general access structures, Inform. Comput., vol. 129, pp. 86-106, 1996. [BLUN99] C. Blundo, A. De Santis, D. Stinson, “On the contrast in visual cryptography schemes,” J. Cryptol., vol. 12, pp. 241-289, 1999. [CHEN11] T. Chen, K. Tsao, “Threshold visual secret sharing by random grids,” J. Syst. Softw., vol.84, pp.1197-1208, 2011. [FU16] Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Trans. Parallel Distrib. Syst., vol. 27, pp. 2546-2559, 2016. [KAFRI87] O. Kafri, E. Keren, “Encryption of pictures and shapes by random grids,” Opt. Lett., vol.12, pp.377-379, 1987. [KANG11] I. Kang, G. Arce, H. Lee, “Color extended visual cryptography using error diffusion,” IEEE Trans. Image Process., vol. 20, 132-145, 2011. [LEE12] K. Lee, P. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Transactions on Information Forensics and Security, vol. 7, pp.219-229, 2012. [LI15] J. Li, X. Li, B. Yang, X. Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, pp. 507-518, 2015. [LIN03] C. Lin, W. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recogn. Lett., vol. 24, pp. 349-358, 2003. [LIU11] F. Liu, C. Wu, “Embedded extended visual cryptography schemes,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 307-322, 2011. [LIU12] F. Liu, C. Wu, L. Qian, et al., “Improving the visual quality of size invariant visual cryptography scheme,” J. Visual Commun. Image Represent., vol. 23, pp.331-342, 2012. [NAOR95] M. Naor, A. Shamir, “Visual cryptography,” Lecture Notes Comput. Sci., vol. 950, pp. 1-12, 1995. [OU14] D. Ou, W. Sun, “Reversible AMBTC-based secret sharing scheme with abilities of two decryptions,” J. Visual Commun. Image Represent., vol. 25, pp.1222-1239, 2014. [SHEN16] G. Shen, F. Liu, Z. Fu, B. Yu, “Perfect contrast XOR-based visual cryptography schemes via linear algebra,” Des. Codes Cryptogr., pp.1-23, 2016. [TUYLS05] P. Tuyls, H. Hollmann, J. Lint, L. Tolhuizen, “XOR-based visual cryptography schemes,” Des. Codes Cryptogr., vol. 37, pp.169-186, 2005. [WANG09] D. Wang, F. Yi, X. Li, “On general construction for extended visual cryptography schemes,” Pattern Recogn, vol. 42, pp. 3071-3082, 2009. [WANG09] Z. Wang, G. Arce, G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Transactions on Information Forensics and Security, vol. 4, pp.383-396, 2009. [WEIR10] J. Weir, W. Yan, “A comprehensive study of visual cryptography,” Trans. Data Hiding Multimedia Security V, pp.70-105, 2010. [WU12] X. Wu, W. Sun, “Visual secret sharing for general access structures by random grids,” IET Inform. Security, vol. 6, pp. 299-309, 2012. [WU13] X. Wu, W. Sun, “Improving the visual quality of random grid-based visual secret sharing,” Signal Process., vol. 93 pp. 977-995, 2013. [WU13] X. Wu, W. Sun, “Generalized random grid and its applications in visual cryptography,” IEEE Transactions on Information Forensics and Security, vol. 8, pp.1541-1553, 2013. [WU14] X. Wu, W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Transactions on Information Forensics and Security, vol. 9, vol.1592-1605, 2014. [XIA16] Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, K. Ren, “A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol.11, pp. 2594-2608, 2016. [XIA16] Z. Xia, X. Wang, X. Sun, Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, pp. 340-352, 2016. [YANG00] C. N. Yang, C. Laih, “New colored visual secret sharing schemes,” Des. Codes Cryptogr., vol. 20, pp.325-036, 2000. [YANG04] C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recogn. Lett., vol. 25, pp.486-494, 2004. [YANG14] C. N. Yang, D.-S. Wang, “Property analysis of XOR-based visual cryptography,” IEEE Trans. Circ. Syst. Video Technol., vol. 24, pp.189-197, 2014. [ZHOU06] Z. Zhou, G. Arce, G. Di Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, pp.2441-2453, 2006. [ZHOU16] Z. Zhou, C. N. Yang, X. Sun, Q. Liu, Q. J. WU, “Effective and efficient image copy detection with resistance to arbitrary rotation,” IEICE Trans. Inform. Syst., vol. 99, pp. 1531-1540, 2016. [ZHOU17] Z. Zhou, Y. Wang, Q. J. Wu, C. N. Yang, X. Sun, “Effective and efficient global context verification for image copy detection,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 48-63, 2017.
|