18
Views
19
CrossRef citations to date
0
Altmetric
Research Articles

Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images

Pages 90-101 | Published online: 18 Jul 2013

References

  • Naor, M. and Shamir, A. Visual cryptography. Lect. Notes Comput. Sci., 1995, 950, 1–12.
  • Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R. Visual cryptography for general access structures. Inf. Comput., 1996, 129(2), 86–106.
  • Blundo, C., De Santis, A. and Naor, M. Visual cryptography for grey-level images. Inf. Process. Lett., 2000, 75, 255–259.
  • Chang, C. C. and Yu, T. X. Sharing a secret gray image in multiple images. Proc. First International Symposium on Cyber Worlds: CW ‘02, Tokyo, Japan, November 2002, pp. 230–237 (IEEE, Piscataway, NJ).
  • Lin, C. C. and Tsai, W. H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Lett., 2003, 24(1–3), 349–358.
  • Zhang, Y. Space-filling curve ordered dither. Comput. Graphics, 1998, 22(4), 559–563.
  • Yang, C. N. and Chen, T. S. Image size invariant visual secret sharing schemes for gray level image. Proc. 14th Information Security Conference, Taipei, Taiwan, June 2004, pp. 464–471 (National Taiwan University of Science and Technology, Taipei, Taiwan).
  • Ito, R., Kuwakado, H. and Tanaka, H. Image Size invariant visual cryptography. IEICE Trans. Fund. Electron. Commun. Comput. Sci., 1999, E82-A(10), 2172–2177.
  • Hou, Y. C., Lin, C. F. and Chang, C. Y. Visual cryptography for color images without pixel expansion. J. Technol., 2001, 16(4), 595–603.
  • Viet, D. Q. and Kurosawa, K. Almost ideal contrast visual cryptography with reversing’. Lect. Notes Comput. Sci., 2004, 2964, 353–365.
  • Mese, M. and Vaidyanathan, P. P. Recent advances in digital halftoning and inverse halftoning methods. IEEE Trans. Circuits Syst. I, 2002, 49(6), 790–805.
  • Blundo, C., De Santis, A. and Stinson, D. R. On the contrast in visual cryptography schemes. J. Cryptol., 1999, 12(4), 261–289.
  • Stinson, D. R. Cryptography – Theory and Practice, 2nd edn, 2002 (Chapman & Hall/CRC, New York).
  • Zhou, Z., Arce, G. R. and Crescenzo, G. D. Halftone visual cryptography. Proc. IEEE Int. Conf. Image Processing: ICIP ‘03, Barcelona, Spain, September 2003, Vol. 1, pp. 521–524 (IEEE Signal Processing Society, NJ, USA).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.