34
Views
2
CrossRef citations to date
0
Altmetric
Original Article

Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme

&
Pages 334-340 | Accepted 08 Dec 2011, Published online: 12 Nov 2013

REFERENCES

  • Naor M, Shamir A. Visual cryptography. LNCS, 1994, 950, 1–12.
  • Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography. IEICE Trans. Fund. Electron. Commun. Comput. Sci., 1999, E82-A, 2172–2177.
  • Yang CN. New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett., 2004, 25, 481–494.
  • Yang CN, Chen TS. New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Trans. Fund. Electron. Commun. Comput. Sci., 2006, E89-A, 620–625.
  • Cimato S, de Prisco R, de Santis A. Probabilistic visual cryptography schemes. Comput. J., 2006, 49, 97–107.
  • Wang D, Yi F, Li X. Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci., 2011, 181, 2189–2208.
  • Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Chen YH, Run RS, Lai JL, Chen RJ. A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst. Appl., 2010, 37, 7858–7869.
  • Surekha B, Swamy G, Rao KS. A multiple watermarking technique for images based on visual cryptography. Comput. Appl., 2010, 1, 77–81.
  • Monoth T, Anto BP. Tamperproof transmission of fingerprints using visual cryptography schemes. Proc. Comput. Sci., 2010, 2, 143–148.
  • Weir J, Yan W. Resolution variant visual cryptography for street view of Google maps, Proc. IEEE Int. Symp. on Circuits and systems: ISCAS 2010, Paris, France, May–June 2010, IEEE Circuits and Systems Society, pp. 1695–1698.
  • Yang CN, Chen TS, Ching MH. Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr. Computer-Aided Eng., 2006, 13, 189–199.
  • Cimato S, Yang CN. Visual Cryptography and Secret Image Sharing, 2011, 1st edition (CRC Press/Taylor & Francis Group, Boca Raton, FL).
  • Hsu HC, Chen TS, Lin YH. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, Proc. 2004 IEEE Int. Conf. on Networking, sensing & control: ICNSC ’04, Taipei, Taiwan, March 2004, IEEE, 996–1001.
  • Chen J, Chen TS, Hsu HC, Lin YH. Using multi-ringed shadow image of visual cryptography to hide more secret messages. Imag. Sci. J., 2009, 57, 101–108.
  • Wu HC, Chang CC. Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces, 2005, 28, 123–135.
  • Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K. Sharing multiple secrets in visual cryptography. Pattern Recognit., 2007, 40, 3633–3651.
  • Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP. Visual secret sharing for multiple secrets. Pattern Recognit., 2008, 41, 3572–3581.
  • Yang CN, Chung TH. A general multi-secret visual cryptography scheme. Opt. Commun., 2010, 283, 4949–4962.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.