Citation: | WANG Xiang, PEI Qingqi, YAN Peimin, et al., “A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 795-798, 2013, |
M. Naor and A. Shamir, “Visual cryptography”, Advances in Cryptolgy EUROCRYPT, Vol.950, pp.1-12, 1995.
|
Y.F. Chen, Y.K. Chan, C.C. Huang, M.H. Tsai, Y.P. Chu, “Am ultiple-level visual secret-shating scheme without image sizee xpansion”, Information Sciences, Vol.177, No.21, pp.4696-4710, 2007.
|
Wen-Pinn and Fang, “Friendly progressive visual secret sharing”, Pattern Recognition, Vol.41, No.4, pp.1410-1414, 2008.
|
Y. Zhonglan, X. Guangsheng and D. Ye, “Nested visual cryptographys cheme”, Chinese Journal of Electronics, Vol.17, No.3,p p.459-463, 2008.
|
S.J. Shyu, “Image encryption by multiple tandom grids”, PatternR ecognition, Vol.42, No.7, pp.1582-1596, 2009.
|
L. Chen and C. Wu, “A study on visual cryptography”, Ph.D.D issertation, Master Thesis, National Chiao Tung University,T aiwan, ROC, 1998.
|
H.C. Wu and C.C. Chang, “Sharing visual multi-secrets usingc ircle shares”, Computer Standards & Interfaces, Vol.28, No.1,p p.123-135, 2005.
|
J.B. Feng, H.C. Wu, C.S. Tsai, Y.F. Chang, Y.P. Chu, “Visuals ecret sharing for multiple secrets”, Pattern Recagnition,Vol.41, No.12, pp.3572-3581, 2008.
|
J. Chen, T.S. Chen, H.C. Hsu, Y.H. Lin, “Using multi-ringeds hadow image of visual cryptography to hide more secret messages”,I maging Science Journal, Vol.57, No.2, pp.101-108,2 009.
|
R.Z. Wang and S.F. Hsu, “Tagged Visual cryptography”, IEEES ignal Processing Letters, Vol.18, No.11, pp.627-630, 2011.
|