|
[ATEN96]G. Ateniese, C. Blundo, A. De Santis, and D. Stinson, “Visual cryptography for general access structures,” Information and Computation 129, 86–106, 1996. [BLUN98]C. Blundo and A. De Santis, “Visual cryptography schemes with perfect reconstruction of black pixels,” Computers & Graphics 22, 449–455, 1998. [BLUN99]C. Blundo, A. De Santis, and D. Stinson, “On the contrast in visual cryptography schemes,” Journal of Cryptology 12, 241–289, 1999. [CHEN09]T. Chen and K. Tsao, “Visual secret sharing by random grids revisited,” Pattern Recognition 42, 2203–2217, 2009. [CHEN11]T. Chen and K. Tsao, “Threshold visual secret sharing by random grids,” Journal of Systems and Software 84, 1197–1208, 2011. [CIMA05]S. Cimato, A. De Santis, A.L. Ferrara, and B. Masucci, “Ideal contrast visual cryptography schemes with reversing,” Information Processing Letters 93, 199–206, 2005. [CIMA06]S. Cimato, R. De Prisco, and A. De Santis, “Probabilistic visual cryptography schemes,” The Computer Journal 49, 97–107, 2006. [CRAN98]R. Crandall, “Some notes on steganography,” Posted on steganography mailing list, 1–6, 1998. [EISE02]P.A. Eisen and D.R. Stinson, “Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels,” Designs, Codes and Cryptography 25, 15–61, 2002. [HARN20]L. Harn, Z. Xia, C. Hsu, and Y. Liu, “Secret sharing with secure secret reconstruction,” Information Sciences 519, 1–8, 2020. [HOFM00]T. Hofmeister, M. Krause, and H. Simon, “Contrast-optimal k out of n secret sharing schemes in visual cryptography,” Theoretical Computer Science 240, 471–485, 2000. [ITO99]R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82, 2172–2177, 1999. [JIA18a]X. Jia, D. Wang, Q. Chu, and Z. Chen, “An efficient xor-based verifiable visual cryptographic scheme,” Multimedia Tools and Applications, 1–17, 2018a. [JIA18b]X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative visual cryptography schemes,” IEEE Transactions on Circuits and Systems for Video Technology 28, 1056–1070, 2018b. [JIA19]X. Jia, D. Wang, D. Nie, X. Luo, and J.Z. Sun, “A new threshold changeable secret sharing scheme based on the chinese remainder theorem,” Information Sciences 473, 13–30, 2019. [JIN05]D. Jin, W.Q. Yan, and M.S. Kankanhalli, “Progressive color visual cryptography,” Journal of Electronic Imaging 14, 033019, 2005. [KIM07]D.S. Kim, “Weight distributions of hamming codes,” ArXiv ab- s/0710.1467, 2007. [KIM16]C. Kim and C.N. Yang, “Data hiding based on overlapped pixels using hamming code,” Multimedia Tools and Applications 75, 15651–15663, 2016. [KUMA20]R. Kumar and K.H. Jung, “Robust reversible data hiding scheme based on two-layer embedding strategy,” Information Sciences 512, 96–107, 2020. [LI12]P. Li, P.J. Ma, X.H. Su, and C.N. Yang, “Improvements of a two-in-one image secret sharing scheme based on gray mixing model,” Journal of Visual Communication and Image Representation 23, 441–453, 2012. [LI13]P. Li, C.N. Yang, Q. Kong, Y. Ma, and Z. Liu, “Sharing more information in gray visual cryptography scheme,” Journal of Visual Communication and Image Representation 24, 1380–1393, 2013. [LIN07]S.J. Lin and J.C. Lin, “Vcpss: A two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches,” Pattern Recognition 40, 3652–3666, 2007. [LIU18]Y. Liu, C. Yang, Y. Wang, L. Zhu, and W. Ji, “Cheating identifiable secret sharing scheme using symmetric bivariate polynomial,” Information Sciences 453, 21–29, 2018. [LIU20]Y. Liu, C. Yang, and Q. Sun, “Thresholds based image extraction schemes in big data environment in intelligent traffic management,” IEEE Transactions on Intelligent Transportation Systems, 2020. [NAOR95]M. Naor and A. Shamir, “Visual cryptography,” Lecture Notes in Com- puter Science 950, 1–12, 1995. [QIN19]C. Qin, X. Qian, W. Hong, and X. Zhang, “An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer,” Information Sciences 487, 176–192, 2019. [SHAM79]A. Shamir, “How to share a secret,” Communications of the ACM 22, 612–613, 1979. [SHYU11]S.J. Shyu, and M.C. Chen, “Optimum pixel expansions for threshold visual secret sharing schemes,” IEEE Transactions on Information Forensics and Security 6, 960–969, 2011. [SHYU15]S.J. Shyu, and M.C. Chen, “Minimizing pixel expansion in visual cryptographic scheme for general access structures,” IEEE Transactions on Circuits and Systems for Video Technology 25, 1557–1561, 2015. [TAN20]L. Tan, Y. Lu, X. Yan, L. Liu, and X. Zhou, “Xor-ed visual secret sharing scheme with robust and meaningful shadows based on qr codes,” Multimedia Tools and Applications 79, 5719–5741, 2020. [THIE02]C.C. Thien, and J.C. Lin, “Secret image sharing,” Computers & Graphics 26, 765–770, 2002. [TUYL05]P. Tuyls, H. Hollmann, J. Lint, and L. Tolhuizen, “Xor-based visual cryptography schemes,” Designs, Codes and Cryptography 37, 169–186, 2005. [WANG13]D. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal contrast grayscale visual cryptography schemes with reversing,” IEEE Trans. Information Forensics and Security 8, 2059–2072, 2013. [WEST01]A. Westfeld, “F5ła steganographic algorithm,” International workshop on information hiding, Springer. pp. 289–302, 2001. [WU11]X. Wu and W. Sun, “Random grid-based visual secret sharing for general access structures with cheat-preventing ability,” Journal of Systems and Software 85, 1119–1134, 2011. [WU13]X. Wu and W. Sun, “Improving the visual quality of random grid-based visual secret sharing,” Signal Processing 93, 977–995, 2013. [WU14]X. Wu and W. Sun, “Extended capabilities for xor-based visual cryptography,” IEEE Transactions on Information Forensics and Security 9, 1592– 1605, 2014. [WU19a]X. Wu and Z.R. Lai, “Random grid based color visual cryptography scheme for black and white secret images with general access structures,” Signal Processing: Image Communication 75, 100–110, 2019. [WU19b]X. Wu and C.N. Yang, “A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,” Journal of Visual Communication and Image Representation 61, 74–84, 2019. [WU20]X. Wu and C.N. Yang, “Probabilistic color visual cryptography schemes for black and white secret images,” Journal of Visual Communication and Image Representation, 102793, 2020. [YAN18]X. Yan, X. Liu, and C.N. Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of real-time image processing 14, 61–73, 2018. [YANG04]C. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters 25, 486–494, 2004. [YANG08]C.N. Yang, C.C. Wang, and T.S. Chen, “Visual cryptography schemes with reversing,” The Computer Journal 51, 710–722, 2008. [YANG10]C.N. Yang and C.B. Ciou, “Image secret sharing method with two- decoding-options: Lossless recovery and previewing capability,” Image and Vision Computing 28, 1600–1610, 2010. [YANG15]C.N. Yang and C.Y. Lin, “Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels,” Information Sciences 312, 131–151, 2015. |