References
- Shamir, A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
- Naor, M. and Shamir, A. Visual cryptography. In Advances in Cryptology—Eurocrypt ’94 (Ed. A. De Santis), 1995, Lecture Notes in Computer Science, Vol. 950, pp. 1–12 (Springer, Berlin).
- Ateniese, G., Blundo, C., de Santis, A. and Stinson: D. R. Visual cryptography for general access structures. Inf. Comput., 1999, 129(2), 86–106.
- Chang, C. C. and Wu, H. C. A copyright protection scheme of images based on visual cryptography. Imag. Sci. J., 2001, 14, 141–150.
- Lukac, R. and Plataniotis, K. N. Colour image secret sharing. IEE Electron. Lett., 2004, 40(9), 529–530.
- Nakajima, N. and Yamaguchi, Y. Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imag., 2004, 13(3), 654–662.
- Tsai, C. S., Chang, C. C. and Chen, T. S. Sharing multiple secret in digital images. J. Syst. Software, 2002, 64(2), 163–170.
- Chen, J., Chen, T. S., Hsu, H. C. and Chen, H. W. New visual cryptography system based on circular shadow images and fixed angle segmentation. J. Electron. Imag., 2005, 14(3), 033018 (1–5).
- Wu, H. C. and Chang, C. C. Sharing visual multisecrets using circle shares. Comput. Stand. Interf., 2005, 28(1), 123–135.
- Lukac, R., Plataniotis, K. N., Smolka, B. and Venetsanopoulos, A. N. A new approach to color image secret sharing. Proc. XII European Signal Processing Conf. EUSIPCO-2004, Vienna, Austria, 7–10 September, 2004, Eurasip, pp. 1493–1496.
- Lukac, R. and Plataniotis, K. N. A color image secret sharing scheme satisfying the perfect reconstruction property. Proc. 2004 Int. Workshop on Multimedia Signal Processing, MMSP’04, Sienna, Italy, 29 September–1 October 2004, (IEEE, New Jersey ), pp. 351–354.
- Lukac, R. and Plataniotis, K. N. Document image secret sharing using bit-level processing. Proc. 2004 Int. Conf. on Image Processing, ICIP’04, Singapore, 24–27 October 2004, (IEEE, New Jersey), Vol. III, pp. 2893–2896.
- Lukac, R. and Plataniotis, K. N. Bit-level based secret sharing for image encryption. Pattern Recognition, 2005, 38, 767–772.