Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Hu, Chi-Ming
and
Tzeng, Wen-Guey
2005.
Information Security.
Vol. 3650,
Issue. ,
p.
300.
Simon, Hans Ulrich
2005.
Fundamentals of Computation Theory.
Vol. 3623,
Issue. ,
p.
221.
Cimato, Stelvio
De Santis, Alfredo
Ferrara, Anna Lisa
and
Masucci, Barbara
2005.
Ideal contrast visual cryptography schemes with reversing.
Information Processing Letters,
Vol. 93,
Issue. 4,
p.
199.
Cimato, S.
De Prisco, R.
and
De Santis, A.
2006.
Probabilistic Visual Cryptography Schemes.
The Computer Journal,
Vol. 49,
Issue. 1,
p.
97.
Koga, Hiroki
and
Ueda, Etsuyo
2006.
Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels.
Designs, Codes and Cryptography,
Vol. 40,
Issue. 1,
p.
81.
Koga, Hiroki
and
Ueda, Etsuyo
2006.
Proposal of an Asymptotically Contrast-Ideal (t, n)- Threshold Visual Secret Sharing Scheme.
p.
912.
Hu, Chih-Ming
and
Tzeng, Wen-Guey
2007.
Cheating Prevention in Visual Cryptography.
IEEE Transactions on Image Processing,
Vol. 16,
Issue. 1,
p.
36.
Hajiabolhassan, Hossein
and
Cheraghi, Abbas
2010.
Bounds for visual cryptography schemes.
Discrete Applied Mathematics,
Vol. 158,
Issue. 6,
p.
659.
Feng Liu
Chuankun Wu
and
Xijun Lin
2010.
Step Construction of Visual Cryptography Schemes.
IEEE Transactions on Information Forensics and Security,
Vol. 5,
Issue. 1,
p.
27.
Manimurugan, S.
and
Porkumaran, K.
2011.
A new fast and efficient visual cryptography scheme for medical images with forgery detection.
p.
594.
Liu, Feng
Guo, Teng
Wu, ChuanKun
and
Yang, Ching-Nung
2012.
Digital Forensics and Watermarking.
Vol. 7128,
Issue. ,
p.
211.
Guo, Teng
Liu, Feng
and
Wu, ChuanKun
2012.
Information Security and Cryptology.
Vol. 7537,
Issue. ,
p.
86.
Liu, Feng
guo, Teng
Wu, ChuanKun
and
Qian, Lina
2012.
Improving the visual quality of size invariant visual cryptography scheme.
Journal of Visual Communication and Image Representation,
Vol. 23,
Issue. 2,
p.
331.
Lin, Sian-Jheng
and
Chung, Wei-Ho
2012.
A Probabilistic Model of $(t,n)$ Visual Cryptography Scheme With Dynamic Group.
IEEE Transactions on Information Forensics and Security,
Vol. 7,
Issue. 1,
p.
197.
Li, Peng
Ma, Pei-Jun
Su, Xiao-Hong
and
Yang, Ching-Nung
2012.
Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
Journal of Visual Communication and Image Representation,
Vol. 23,
Issue. 3,
p.
441.
Guo, Teng
Liu, Feng
and
Wu, ChuanKun
2012.
Information Security Practice and Experience.
Vol. 7232,
Issue. ,
p.
217.
Simon, Hans Ulrich
2012.
Computer Science – Theory and Applications.
Vol. 7353,
Issue. ,
p.
314.
Li, Peng
Yang, Ching-Nung
Kong, Qian
Ma, Yanpeng
and
Liu, Zheng
2013.
Sharing more information in gray visual cryptography scheme.
Journal of Visual Communication and Image Representation,
Vol. 24,
Issue. 8,
p.
1380.
Wu, Xiaotian
and
Sun, Wei
2014.
Improved tagged visual cryptography by random grids.
Signal Processing,
Vol. 97,
Issue. ,
p.
64.
D’Arco, P.
De Prisco, R.
and
De Santis, A.
2014.
Measure-independent characterization of contrast optimal visual cryptography schemes.
Journal of Systems and Software,
Vol. 95,
Issue. ,
p.
89.