|
[BOSE82] B. Bose and T. R. Rao, “Theory of unidirectional error correcting/detecting codes,” IEEE Transactions on Computers, no. 6, pp. 521– 530, 1982. [BLUN03] C. Blundo, P. D’Arco, A. De Santis, and D. R. Stinson, “Contrast optimal threshold visual cryptography schemes,” SIAM Journal on Discrete Mathematics, vol. 16, no. 2, pp. 224–261, 2003. [CIMA05] S. Cimato, A. De Santis, A. L. Ferrara, and B. Masucci, “Ideal contrast visual cryptography schemes with reversing,” Information Processing Letters, vol. 93, no. 4, pp. 199–206, 2005.[CIMA06] S. Cimato, R. De Prisco, and A. De Santis, “Probabilistic visual cryptography schemes,” The Computer Journal, vol. 49, no. 1, pp. 97– 107, 2006. [CHEN09] T. Chen and K. Tsao, “Visual secret sharing by random grids revisited,” Pattern Recognition, vol. 42, no. 9, pp. 2203–2217, 2009. [EISE02] P. A. Eisen and D. R. Stinson, “Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels,” Designs, Codes and Cryptography, vol. 25, no. 1, pp. 15–61, 2002. [HOU03] Y. Hou, “Visual cryptography for color images,” Pattern Recognition, vol. 36, no. 7, pp. 1619–1629, 2003. [HU16] H. Hu, G. Shen, Z. Fu, B. Yu, and J. Wang, “General construction for xor-based visual cryptography and its extended capability,” Multimedia Tools and Applications, vol. 75, no. 21, pp. 13 883–13 911, 2016. [JIN05] D. Jin, W.Q. Yan, and M.S. Kankanhalli, “Progressive color visual cryptography,” Journal of Electronic Imaging, vol. 14, no. 3, p. 033019, 2005. [JIA18] X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative visual cryptography schemes,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 5, pp. 1056–1070, 2018. [JIA19] X. Jia, D. Wang, Q. Chu, and Z. Chen, “An efficient xor-based verifiable visual cryptographic scheme,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8207–8223, 2019. [KUND90] S. Kundu and S.M. Reddy, “On symmetric error correcting and all unidirectional error detecting codes,” IEEE transactions on computers, vol. 39, no. 6, pp. 752–761, 1990. [LAIH95] C.S. Laih and C.N. Yang, “On the analysis and design of group theoretical t-syec/aued codes,” IEEE transactions on computers, vol. 45, no. 1, pp. 103–108, 1996. [LI12] P. Li, P.J. Ma, X.H. Su, and C.N. Yang, “Improvements of a two-inone image secret sharing scheme based on gray mixing model,” Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 441–453, 2012. [LI18] P. Li, Z. Liu, and C.N. Yang, “A construction method of (t, k, n)-essential secret image sharing scheme,” Signal Processing: Image Communication, vol. 65, pp. 210–220, 2018. [LIN07] S.J. Lin and J.C. Lin, “Vcpss: A two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomialstyle sharing (pss) approaches,” Pattern Recognition, vol. 40, no. 12, pp. 3652–3666, 2007. [LIU10] F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptography schemes,” Information Forensics and Security, IEEE Transactions on, vol. 5, no. 1, pp. 27–38, 2010. [LIU17] Y. Liu and C. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, vol. 58, pp. 49–55, 2017. [LIU18] Y.N. Liu, Q. Zhong, M. Xie, and Z.B. Chen, “A novel multiplelevel secret image sharing scheme,” Multimedia Tools and Applications, vol. 77, no. 5, pp. 6017–6031, 2018. [NAOR95] M. Naor and A. Shamir, “Visual cryptography,” Lecture Notes in Computer Science, vol. 950, no. 1, pp. 1–12, 1995. [SHEN17] G. Shen, F. Liu, Z. Fu, and B. Yu, “Perfect contrast xor-based visual cryptography schemes via linear algebra,” Designs, Codes and Cryptography, vol. 85, no. 1, pp. 15–37, 2017. [SHYU11] S. J. Shyu and M. C. Chen, “Optimum pixel expansions for threshold visual secret sharing schemes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 960–969, 2011.[THIE02] C.C. Thien and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, no. 5, pp. 765–770, 2002. [TUYL05] P. Tuyls, H. Hollmann, J. Lint, and L. Tolhuizen, “Xor-based visual cryptography schemes,” Designs, Codes and Cryptography, vol. 37, no. 1, pp. 169–186, 2005. [VOLD95] E. Volden, G. Giraudon, and M. Berthod, “Image redundancy and classification,” in International Conference on Computer Analysis of Images and Patterns. Springer, pp. 206–213, 1995. [VERH97] E.R. Verheul and H.C. Van Tilborg, “Constructions and properties of k out of n visual secret sharing schemes,” Designs, Codes and Cryptography, vol. 11, no. 2, pp. 179–196, 1997. [WU12] X. Wu and W. Sun, “Visual secret sharing for general access structures by random grids,” IET information security, vol. 6, no. 4, pp. 299–309, 2012. [WANG13] D. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal contrast grayscale visual cryptography schemes with reversing.” IEEE Trans. Information Forensics and Security, vol. 8, no. 12, pp. 2059–2072, 2013. [WU13] X. Wu and W. Sun, “Improving the visual quality of random grid-based visual secret sharing,” Signal Processing, vol. 93, no. 5, pp. 977–995, 2013. [WU19] X. Wu and C.N. Yang, “A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,” Journal of Visual Communication and Image Representation, vol. 61, pp. 74–84, 2019. [WU20] X. Wu and C.N. Yang, “Probabilistic color visual cryptography schemes for black and white secret images,” Journal of Visual Communication and Image Representation, p. 102793, 2020. [YAN17] X. Yan and Y. Lu, “Contrast-improved visual secret sharing based on random grid for general access structure,” Digital Signal Processing, vol. 71, pp. 36–45, 2017. [YAN20] X. Yan, Y. Lu, L. Liu, and X. Song, “Reversible image secret sharing,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3848–3858, 2020. [YANG04] C. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, no. 4, pp. 486–494, 2004. [YANG14a] C.N. Yang and D.S. Wang, “Property analysis of xor-based visual cryptography,” IEEE transactions on circuits and systems for video technology, vol. 24, no. 2, pp. 189–197, 2014. [YANG14b] C.N. Yang, C.C. Wu, and D.S. Wang, “A discussion on the relationship between probabilistic visual cryptography and random grid,” Information Sciences, vol. 278, pp. 141–173, 2014. [YANG20] C.N. Yang and Y.Y. Yang, “On the analysis and design of visual cryptography with error correcting capability,” IEEE Transactions on Circuits and Systems for Video Technology, 2020. |