Open Access
MATEC Web Conf.
Volume 71, 2016
The International Conference on Computing and Precision Engineering (ICCPE 2015)
Article Number 01002
Number of page(s) 4
Section Computational and Mathematical Sciences
Published online 02 August 2016
  1. C. Blundo, A. Santis, Visual cryptography schemes with perfect reconstruction of black pixels. Computer Graph 22(4): 449–455 (1998). [CrossRef]
  2. C. Blundo, A. Bonis, A. Santis, Improved schemes for visual cryptography. Designs, Codes and Cryptograph 24: 255–278 (2001). [CrossRef]
  3. J.J.-Y. Chang, J.S.-T. Juan, Multi-VSS schemeby shifting random grids. In Proc. World Academy of Science, Engineering and Technology, 65, Tokyo, Japan, 29-30 May 2012: 1277–1283(2012).
  4. L.-C. Chen, Multi-Secret Images Sharing Schemes, Master Thesis: National Chi Nan University (2014).
  5. T.-H. Chen, K.-H. Tsao, K.-C. Wei, Multiple-image encryption by rotating random grids. In Intelligent Systems Design and Applications, 2008. ISDA’08.Eighth International Conference on 3: 252–256(2008): IEEE. [CrossRef]
  6. O. Kafri, E. Keren, Encryption of pictures and shapes by random grids. Optics Letters 12(6): 377–379 (1987). [CrossRef]
  7. K. Kobara, H. Imai, Limiting the visible space visual secret sharing schemes and their application to human identification. In Advances in Cryptology—ASIACRYPT’96 185–195 (1996): Springer Berlin Heidelberg.
  8. F. Liu, C. K. Wu, X. J. Lin, The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50(2): 215–227 (2009). [CrossRef]
  9. M. Nakajima, Y. Yamaguchi, Extended visual cryptography for natural images. Journal of WSCG 10(2): 303–310(2002).
  10. M. Nakajima, Y. Yamaguchi, Enhancing registration tolerance of extended visual cryptography for natural images. Journal of Electronic Imaging 13(3): 654–662(2004). [CrossRef]
  11. M. Naor, A. Shamir, Visual cryptography. In Advances in Cryptology—EUROCRYPT’94 1–12 (1995): Springer Berlin Heidelberg.
  12. S. J. Shyu, Image encryption by random grids. Pattern Recognition 40: 1014–1031(2007). [CrossRef]
  13. E. R. Verheul, H. C. Van Tilborg, Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11(2): 179–19(1997). [CrossRef]
  14. D.S. Wang, L. Dong, X. Li, Towards shift tolerant visual secret sharing schemes.IEEE Transactions on Information Forensics and Security 6(2): 323–337(2011). [CrossRef]
  15. C. N. Yang, A. G. Peng, T. S. Chen, MTVSS: Misalignment tolerant visual secret sharing on resolving alignment difficulty. Signal Process 89: 1602–1624 (2009). [CrossRef]