Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
15
Page No.
2656 - 2662
References
Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognit., 36: 1619-1629.
CrossRef | Direct Link | Hu, C.M. and W.G. Tzeng, 2007. Cheating prevention in visual cryptography. IEEE. Trans. Image process., 16: 36-45.
CrossRef | Direct Link | Kang, I., G.R. Arce and H.K. Lee, 2011. Color extended visual cryptography using error diffusion. IEEE. Trans. Image Process., 20: 132-145.
CrossRef | PubMed | Direct Link | Nakajima, M. and Y. Yamaguchi, 2002. Extended visual cryptography for natural images. J. WSCG., 10: 303-310.
Naor, M. and A. Shamir, 1995. Visual Cryptography. In: Advances in Cryptology, De Santis, A. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-60176-0, pp: 1-12.
Naor, M. and A. Shamir, 1996. Visual Cryptography II: Improving the Contrast Via the Cover Base. In: International Workshop on Security Protocols. Mark, L. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-62494-3, pp: 197-202.
Ramesh, K.R. and S. Chandramathi, 2015. Enhanced color visual cryptography using halftoning schemes. Aust. J. Basic Appl. Sci., 9: 8-14.
Direct Link | Verheul, E.R. and H.V. Tilborg, 1997. Constructions and properties of k out of n visual secret sharing schemes. Designs Codes Cryptogr., 11: 179-196.
CrossRef | Direct Link | Zhang, X., X. Feng, W. Wang and W. Xue, 2013. Edge strength similarity for image quality assessment. IEEE. Signal process. Lett., 20: 319-322.
CrossRef | Direct Link |