Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
CrossRef
MATH
MathSciNet
Google Scholar
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
CrossRef
Google Scholar
Biehl, I., Wetzel, S.: Traceable visual cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 61–71. Springer, Heidelberg (1997)
CrossRef
Google Scholar
Hofmeister, T., Krause, M., Simon, H.-U.: Contrast-optimal \(k\) out of \(n\) secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)
CrossRef
MATH
MathSciNet
Google Scholar
Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored visual cryptography schemes. Des. Codes Crypt. 35, 311–335 (2005)
CrossRef
MATH
Google Scholar
Ishihara, T., Koga, H.: A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86–A(1), 194–197 (2003)
Google Scholar
Koga, H., Ishihara, T.: A general method for construction of \((t, n)\)- threshold visual secret sharing schemes for color images. Des. Codes Crypt. 61(2), 223–249 (2011)
CrossRef
MATH
MathSciNet
Google Scholar
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)
CrossRef
MATH
Google Scholar
Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple secret. In: Proceedings of International Symposium on Cyber Worlds, pp. 1–8 (2002)
Google Scholar
Iwamoto, M., Wang, L., Yoneyama, K., Kunihiro, N., Ohta, K.: Visual secret sharing schemes for multiple secret images allowing the rotation of shares. IEICE Trans. Fundam. E89(5), 1382–1395 (2006)
CrossRef
Google Scholar
Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)
CrossRef
MathSciNet
Google Scholar
Iwamoto, M.: Security notions of visual secret sharing schemes. In: Proceedings of IWAIT, pp. 95–100 (2013)
Google Scholar
Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199–206 (2005)
CrossRef
MATH
Google Scholar
Eisen, P.A., Stinson, D.R.: Threshold visual cryptography with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25(1), 15–61 (2002)
CrossRef
MATH
MathSciNet
Google Scholar
Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recog. 40(8), 2356–2366 (2007)
CrossRef
MATH
Google Scholar
Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36–45 (2007)
CrossRef
MATH
MathSciNet
Google Scholar
Chen, Y.C., Horng, G., Tsai, D.S.: Comment on ‘cheating prevention in visual cryptography’. IEEE Trans. Image Process. 21(7), 3319–3323 (2012)
CrossRef
MathSciNet
Google Scholar
Chen, Y.C., Tsai, D.S., Horng, G.: A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225–1233 (2012)
CrossRef
Google Scholar