International Journal of Soft Computing
Year:
2016
Volume:
11
Issue:
6
Page No.
374 - 381
References
Blundo, C., A. de Santis and M. Naor, 2000. Visual cryptography for grey level images. Inform. Process. Lett., 75: 255-259.
CrossRef | Direct Link | Chavan, P.V., D. Atique and D. Malik, 2014. Design and implementation of hierarchical visual cryptography with expansion less shares. Int. J. Network Secur. Appl., 6: 91-102.
Direct Link | Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognit., 36: 1619-1629.
CrossRef | Direct Link | Ito, R., H. Kuwakado and H. Tanaka, 1999. Image size invariant visual cryptography. IEICE Trans. Fundam., E82-A: 2172-2177.
Direct Link | Jaafar, A. and A. Samsudin, 2012. A survey of black-and-white visual cryptography models. Int. J. Digital Content Technol. Appl., 6: 1-12.
Jaya, J., 2013. Securing cloud data and cheque truncation system with visual cryptography. Int. J. Comput. Appl., 70: 16-21.
CrossRef | Direct Link | Lee, K.H. and P.L. Chiu, 2012. An extended visual cryptography algorithm for general access structures. IEEE Trans. Inform. Forensics Secur., 7: 219-229.
CrossRef | Lin, C.C. and W.H. Tsai, 2003. Visual cryptography for gray-level images by dithering techniques. Pattern Recognit. Lett., 24: 349-358.
CrossRef | Moni, N. and A. Shamir, 1995. Visual Cryptography Advances in Cryptology-Eurocrypt'94. Springer, Berlin, Germany,.
Nung, Y.A.N.G.C. and T.C.H.E.N. Shih, 2005. Size-adjustable visual secret sharing schemes. IEICE. Trans. Fundam. Electron. Commun. Comput. Sci., 88: 2471-2474.
Direct Link | Nung, Y.A.N.G.C. and T.C.H.E.N. Shih, 2006. New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE. Trans. Fundam. Electron. Commun. Comput. Sci., 89: 620-625.
Direct Link | Stallings, W., 2003. Cryptography and Network Security Principles and Practice. 3rd Edn., Prentice-Hall of India Pvt. Ltd., India.
Thien, C.C. and J.C. Lin, 2002. Secret image sharing. Comput. Graph., 26: 765-770.
CrossRef | Direct Link | Wan, Z., J. Liu and R.H. Deng, 2012. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forensics Secur., 7: 743-754.
CrossRef | Yang, C.N. and T.S. Chen, 2007. Extended visual secret sharing schemes: Improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell., 21: 879-898.
Direct Link | Yang, C.N., 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett., 25: 481-494.
Direct Link |