[1]
A. Shamir, How to share a secret, Communications of the ACM, 22 (1979) 612-613.
DOI: 10.1145/359168.359176
Google Scholar
[2]
G. R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, NJ, USA, 1979, pp.242-268.
Google Scholar
[3]
M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology-Eurocrypt'94, Berlin, 1995, pp.1-12.
DOI: 10.1007/bfb0053419
Google Scholar
[4]
G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information and Computation, 129 (1996) 86-106.
DOI: 10.1006/inco.1996.0076
Google Scholar
[5]
C. S. Hsu, S. F. Tu, Y. C. Hou, An optimization model for visual cryptography schemes with unexpanded shares, in: ISMIS2006, LNAI, Berlin, 2006, pp.58-67.
DOI: 10.1007/11875604_8
Google Scholar
[6]
L. G. Fang, B. Yu, Research on pixel expansion of (2, n) visual threshold scheme, in: 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006, pp.856-860.
DOI: 10.1109/spca.2006.297546
Google Scholar
[7]
S. Lin, S. Chen, J. Lin, Flip visual cryptography (FVC) with perfect security, conditionally- optimal contrast, and no expansion, Journal of Visual Communication & Image Representation, 21 (2010) 900-916.
DOI: 10.1016/j.jvcir.2010.08.006
Google Scholar
[8]
S. J. Shyu, M, C, Chen, Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes, IEEE Transactions on information forensics and security, 6 (2011) 960-969.
DOI: 10.1109/tifs.2011.2158096
Google Scholar
[9]
C. C. Lin, W. H. Tai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24 (2003) 349-358.
DOI: 10.1016/s0167-8655(02)00259-3
Google Scholar
[10]
S. Cimato, R. De Prisco, A. De Santis, Optimal colored threshold visual cryptography schemes, Designs, Codes and Cryptography, 35 (2005) 311-335.
DOI: 10.1007/s10623-003-6741-z
Google Scholar
[11]
C. N. Yang, T. S. Chen, Colored visual cryptography scheme based on additive color mixing, Pattern Recognition, 41 (2008) 3114-3129.
DOI: 10.1016/j.patcog.2008.03.031
Google Scholar
[12]
F. Y. Ng, D. S. Wong, On the security of a visual cryptography scheme for color images, Pattern Recognition, 42 (2009) 929-940.
DOI: 10.1016/j.patcog.2008.08.031
Google Scholar
[13]
B. Yu, X. H. Xu, L. G. Fang, Multi-secret sharing threshold visual cryptography scheme, in: 2007 International Conference on Computational Intelligence and Security (CIS 2007), Harbin, 2007, pp.815-818.
DOI: 10.1109/cisw.2007.4425620
Google Scholar
[14]
L. H. Chen, C. C. Wu, A study on visual cryptography, Master Thesis, National Chiao Tung University, Taiwan, (1998).
Google Scholar
[15]
H. C. Wu, C. C. Chang, Sharing visual multi-secrets using circle shares, Computer Standards & Interfaces, 28 (2005) 123-135.
DOI: 10.1016/j.csi.2004.12.006
Google Scholar
[16]
J. S. Shyong, S. Y. Huang, Y. K. Lee and R. Z. Wang, Sharing multiple secrets in visual crypto- graphy, Pattern Recognition, 40 (2007) 3633-3651.
DOI: 10.1016/j.patcog.2007.03.012
Google Scholar
[17]
H. C. Hsu, T. S. Chen, Y. H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, 2004, pp.996-1001.
DOI: 10.1109/icnsc.2004.1297083
Google Scholar
[18]
J. B. Feng, H. C. Wub, C. S. Tsaic, Visual secret sharing for multiple secrets, Pattern Recog- nition, 41 (2008) 3572-3581.
Google Scholar