L. Bai
[1] C.-C. Thien & J.-C. Lin, Secret image sharing, Computers & Graphics, 26 (5), 2002, 765–770. [2] G. Blakley, Safeguarding crypographic keys, Proc. AFIPS1979 National Computer Conference, 48, Arlington, VA, 1979,313–317. [3] A. Shamir, How to share a secret, Communications of theACM, 22 (11), 1979, 612–613. [4] E.D. Karnin, J.W. Greene, & M.E. Hellman, On secret sharing systems, IT-29(1), 1983, 35–41. [5] K. Kurosawa, K. Okada, K. Sakano, W. Ogata, & S. Tsujii, Nonperfect secret sharing schemes and matroids, Lecture Notes in Computer Science, 765, 1994, 126–141. [Online]. Available: citeseer.ist.psu.edu/article/kurosawa94nonperfect.html [6] K. Srinathan, N. Tharani Rajan, & C. Pandu Rangan, Non-perfect secret sharing over general access structures, IN-DOCRYPT, 2002, 409–421. [7] A. Beimel & B. Chor, Secret sharing with public reconstruction, 44 (5), 1998, 1887–1896. [8] A. De Santis & B. Masucci, Multiple ramp schemes, 45 (5), 1999, 1720–1728. [9] M. Naor & A. Shamir, Visual cryptography, Proc. Conf. on Advances in Cryptology – Eurocrypt ’94 (A. De Santis, Ed.), Berlin, Germany, 1994, 1–12. [10] S. Cimato, R.D. Prisco, & A.D. Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49 (1), 2006, 97–107. [11] C. Blundo, S. Cimato, & A.D. Santis, Visual cryptogra-phy schemes with optimal pixel expansion, Theoretical Com-puter Science, 38 (5), 2006, 767–772. [Online]. Available:http://eprint.iacr.org/2006/170 [12] R. Lukac & K.N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, 38 (5), 2005, 767–772. [13] R. Lukac & K.N. Plataniotis, A cost-effective encryption scheme for color images, Real-Time Imaging, 11 (5–6), 2005, 454–464. [14] R. Lukac & K.N. Plataniotis, Digital image indexing using secret sharing schemes: A unified framework for single-sensor consumer electronics, IEEE Transactions on Consumer Electronics, 51 (3), 2005, 908–916. [15] R. Lukac & K.N. Plataniotis, Secure single-sensor digital camera, IEE Electronics Letters, 42 (11), 2006, 627–629. [16] L. Bai, A strong ramp secret sharing scheme using matrix projection, 2nd Int. Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY, 2006. [17] R.M. Capocelli, A. De Santis, L. Gargano, & U. Vaccaro, On the size of shares for secret sharing schemes, Advances in Cryptology – Crypto ’91 (J. Feigenbaum, Ed.), 576, Santa Barbara, California, USA, 1991, 101–113.
Important Links:
Go Back