Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Cimato, Stelvio
De Santis, Alfredo
Ferrara, Anna Lisa
and
Masucci, Barbara
2005.
Ideal contrast visual cryptography schemes with reversing.
Information Processing Letters,
Vol. 93,
Issue. 4,
p.
199.
Hu, Chi-Ming
and
Tzeng, Wen-Guey
2005.
Information Security.
Vol. 3650,
Issue. ,
p.
300.
Simon, Hans Ulrich
2005.
Fundamentals of Computation Theory.
Vol. 3623,
Issue. ,
p.
221.
Cimato, S.
De Prisco, R.
and
De Santis, A.
2006.
Probabilistic Visual Cryptography Schemes.
The Computer Journal,
Vol. 49,
Issue. 1,
p.
97.
Koga, Hiroki
and
Ueda, Etsuyo
2006.
Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels.
Designs, Codes and Cryptography,
Vol. 40,
Issue. 1,
p.
81.
Koga, Hiroki
and
Ueda, Etsuyo
2006.
Proposal of an Asymptotically Contrast-Ideal (t, n)- Threshold Visual Secret Sharing Scheme.
p.
912.
Hu, Chih-Ming
and
Tzeng, Wen-Guey
2007.
Cheating Prevention in Visual Cryptography.
IEEE Transactions on Image Processing,
Vol. 16,
Issue. 1,
p.
36.
Hajiabolhassan, Hossein
and
Cheraghi, Abbas
2010.
Bounds for visual cryptography schemes.
Discrete Applied Mathematics,
Vol. 158,
Issue. 6,
p.
659.
Feng Liu
Chuankun Wu
and
Xijun Lin
2010.
Step Construction of Visual Cryptography Schemes.
IEEE Transactions on Information Forensics and Security,
Vol. 5,
Issue. 1,
p.
27.
Manimurugan, S.
and
Porkumaran, K.
2011.
A new fast and efficient visual cryptography scheme for medical images with forgery detection.
p.
594.
Li, Peng
Ma, Pei-Jun
Su, Xiao-Hong
and
Yang, Ching-Nung
2012.
Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
Journal of Visual Communication and Image Representation,
Vol. 23,
Issue. 3,
p.
441.
Guo, Teng
Liu, Feng
and
Wu, ChuanKun
2012.
Information Security and Cryptology.
Vol. 7537,
Issue. ,
p.
86.
Liu, Feng
guo, Teng
Wu, ChuanKun
and
Qian, Lina
2012.
Improving the visual quality of size invariant visual cryptography scheme.
Journal of Visual Communication and Image Representation,
Vol. 23,
Issue. 2,
p.
331.
Guo, Teng
Liu, Feng
and
Wu, ChuanKun
2012.
Information Security Practice and Experience.
Vol. 7232,
Issue. ,
p.
217.
Lin, Sian-Jheng
and
Chung, Wei-Ho
2012.
A Probabilistic Model of $(t,n)$ Visual Cryptography Scheme With Dynamic Group.
IEEE Transactions on Information Forensics and Security,
Vol. 7,
Issue. 1,
p.
197.
Liu, Feng
Guo, Teng
Wu, ChuanKun
and
Yang, Ching-Nung
2012.
Digital Forensics and Watermarking.
Vol. 7128,
Issue. ,
p.
211.
Simon, Hans Ulrich
2012.
Computer Science – Theory and Applications.
Vol. 7353,
Issue. ,
p.
314.
Li, Peng
Yang, Ching-Nung
Kong, Qian
Ma, Yanpeng
and
Liu, Zheng
2013.
Sharing more information in gray visual cryptography scheme.
Journal of Visual Communication and Image Representation,
Vol. 24,
Issue. 8,
p.
1380.
Liu, Feng
and
Yan, Wei Qi
2014.
Visual Cryptography for Image Processing and Security.
p.
63.
D’Arco, P.
De Prisco, R.
and
De Santis, A.
2014.
Measure-independent characterization of contrast optimal visual cryptography schemes.
Journal of Systems and Software,
Vol. 95,
Issue. ,
p.
89.