REFERENCES
- Blakley, G. R. Safeguarding cryptographic keys. Proc. Natl Comput. Conf., 1979, 48, 313–317.
- Shamir, A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
- Naor, N. and Shamir, A. Visual cryptography. Lect. Notes Comput. Sci., 1995, journal, 1–12.
- Fang, W. P. Friendly progressive visual secret sharing. Patt. Recogn., 2008, journal, 1410–1414.
- Tu, S. F. and Hou, Y. C. Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images. Imag. Sci. J., 2007, journal, 90–101.
- Hou, Y. C. and Tu, S. F. Visual cryptography techniques for color images without pixel expansion. J. Inform. Technol. Soc., 2004, 1, 95–110.
- Zhang, H.-B., Wang, X.-F., Cao, W.-H. and Huang, Y.-P. Visual cryptography for general access structure using pixel-block aware encoding. J. Comput., 2008, 3, 68–75.
- Voyatzis, G. and Pitas, I. Application of toral automorphism in image watermarking. Proc. IEEE Int. Conf. Image Process., 1996, 2, 237–240.