[1]
A. Shamir, How to share a secret, Communications of the ACM 22 (1979) 612–613.
DOI: 10.1145/359168.359176
Google Scholar
[2]
G.R. Blakley, Safeguarding cryptography keys, Proceedings of National Computer Conference, vol. 48, New York, USA, 1979, p.313–317.
Google Scholar
[3]
O. Kafri, E. Keren, Encryption of pictures and shapes by random grids, Optics Letters 12 (6) (1987) 377–379.
DOI: 10.1364/ol.12.000377
Google Scholar
[4]
S.J. Shyu, Image encryption by random grids, Pattern Recognition 40 (3) (2007) 1014–1031.
DOI: 10.1016/j.patcog.2006.02.025
Google Scholar
[5]
S.J. Shyu, Visual multiple-secret sharing by circle random grids, Imaging Sciences 4 (3) (2010) 926–953.
DOI: 10.1137/080722023
Google Scholar
[6]
T.H. Chen, Visual secret sharing by random grids revisited , Pattern Recognition 42 (2009) 2203–2217.
DOI: 10.1016/j.patcog.2008.11.015
Google Scholar
[7]
G. Horng, T.H. Chen, and D.S. Tsai. Cheating in visual cryptography, designs, codes and cryptography, , Vol. 38, No. 2 (2006) 219–236.
DOI: 10.1007/s10623-005-6342-0
Google Scholar
[8]
H. Yan, Z. Gan, and K. Chen, A cheater detectable visual cryptography scheme, (in Chinese) J. Shanghai Jiao tong Univ., vol. 38, no. 1, (2004).
Google Scholar
[9]
G. -B. Horng, T. -G. Chen, and D. -S. Tsai, Cheating in visual cryptography, Designs, Codes, Cryptog., vol. 38, no. 2, p.219–236, (2006).
DOI: 10.1007/s10623-005-6342-0
Google Scholar
[10]
M. Naor and B. Pinkas, Visual authentication and identification, in Proc. Advances in Cryptology, 1997, vol. 1294, LNCS, p.322–336.
Google Scholar
[11]
C. -N. Yang and C. -S. Laih, Some new types of visual secret sharing schemes, in Proc. Nat. Computer Symp., 1999, vol. 3, p.260–268.
Google Scholar
[12]
C.M. Yang and W.G. Tzeng, Cheating prevention in visual cryptography, IEEE transactions on image processing, vol. 16, NO. 1, January (2007).
Google Scholar
[13]
D.S. Tsai, T.H. Chen and G. Horng, A cheating prevention scheme in binary visual cryptography with homogeneous secret image, Pattern Recognition, Vol. 40 No. 8, 2007, pp.2356-2366.
DOI: 10.1016/j.patcog.2007.01.013
Google Scholar
[14]
D. De Prisco and A. De Santis, Cheating immune threshold scheme visual secret sharing, The Computer Journal, doi. 10. 1093/comjnl/bxp098.
DOI: 10.1093/comjnl/bxp068
Google Scholar
[15]
Y.C. Chen, G. Horng and D.S. Tsai, Cheating prevention in visual cryptography , Visual cryptography and secret image sharing, pp.281-296.
DOI: 10.1201/b11068-19
Google Scholar