參考文獻 |
[1] 侯永昌,官振宇,〈有意義且不擴展分享影像之漸進式視覺密碼〉,資訊管理學報,第17卷,第3期,頁131-154,ISSN:1608-5752,2011年。
[2] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., “Visual cryptography for general access structures,” Information and Computation, 129(2), 86-106, 1996.
[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., Extended Capabilities for Visual Cryptography, Theoretical Computer Science, Vol.250, Issue 1-2 (January 2001), 143-161, 2001.
[4] Chen, T. and Tsao, K., “User-friendly random-grid-based visual secret sharing”, IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1693-1703, 2011.
[5] Chen, S. K., “Friendly progressive visual secret sharing using generalized random grids,” Optical Engineering, 48(11), 117001-1-117001-7, 2009.
[6] Chen, S. K. and Lin, J. C., “Fault-tolerant and progressive transmission of images,” Pattern Recognition, 38(12), 2466-2471, 2005.
[7] Chen, T. and Tsao, K., “Threshold visual secret sharing by random grids”, Journal of Systems and Software 84, 1197–1208, 2011
[8] Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656--715, Oct. 1949.
[9] Fang, W. P., “Friendly progressive visual secret sharing,” Pattern Recognition, 41(4), 1410-1414, 2008.
[10] Fang, W. P. and Lin, J. C., “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, 16(4), 632-636, 2006.
[11] Hou, Y. C., “Visual cryptography for color images,” Pattern Recognition, 36(7), 1619-1629, 2003.
[12] Hou, Y. C., Chang, C. Y. and Hsu, C. S., “Visual cryptography for color images without pixel expansion,” in Proceeding of CISST'2001, Vol. I, 239-245, 2001.
[13] Hung, K. H., Chang, Y. J. and Lin, J. C., “Progressive sharing of an image” Optical Engineering, 47(4),047006-1-047006-14, 2008.
[14] Ito, R., Kuwakado, H., and Tanaka, H., “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172-2177, 1999.
[15] Kafri, O. and Keren, E., “Encryption of pictures and shapes by random grids,” Optics Letters, 12(6), 377-379, 1987.
[16] Lin, T. L., Horng, S. J., Lee, K. H., Chiu, P. L., Kao, T. W., Chen, Y. H., Run, R. S., Lai, J. L., Chen, R. J. “A novel visual secret sharing scheme for multiple secrets without pixel expansion,” Expert Systems with Applications, 37(12), 7858-7869, 2010.
[17] M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology — Eurocrypt '94, Lecture Notes in Computer Science, vol.950, Springer, Berlin, pp. 1–12, 1995.
[18] Moulin, P. and O’sullivan, J. A., “Information-theoretic analysis of information hiding,” IEEE Transactions on Information Theory, 49(3), 563-593, 2003.
[19] Naor, M. and Shamir, A., “Visual cryptography,” Advances in Cryptology- EUROCRYPT ’94, LNCS 950, Springer-Verlag, 1-12, 1995.
[20] Shamir, A., “How to share a secret,” Communications of the ACM, 22(11), 612-613, 1979.
[21] Shyu, S. J., “Image encryption by random grids,” Pattern Recognition, 40(3), 1014-1031, 2007.
[22] Shyu, S. J., “Image encryption by multiple random grids,” Pattern Recognition, 42(7), 1582-1596, 2009.
[23] Thien, C. C. and Lin, J. C., “Secret image sharing,” Computers & Graphics, 26(5), 765-770, 2002.
[24] Tu, S. F. and Hou, Y. C., “Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images,” Imaging Science Journal, 55(2), 90-101, 2007.
[25] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, IT-22, pp. 644–654, 1976.
[26] Wang, R. Z., “Region incrementing visual cryptography,” IEEE Signal Processing Letters, 16(8), 659-662, 2009.
[27] Wang, R. Z. and Shyu, S. J., “Scalable secret image sharing,” Signal Processing: Image Communication, 22(4), 363-373, 2007.
[28] Wang, R. Z., Lee, Y. K., Huang, S. Y., and Chia, T. L. , “Multilevel visual secret sharing,” in Proceeding of ICICIC’07, 283-286, 2007.
[29] Wu, D. C. and Tsai, W. H., “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, 24(9-10), 1613-1626, 2003.
[30] Yang, C. N. “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, 25(4), 481-494, 2004.
|