[1] Naor M, Shamir A.Visual Cryptography[J]. Lecture Notes in Computer Science (S0302-9743), 1995, 950(1): 1-12. [2] Verheul E R, Tilborg H C A V. Constructions and Properties of k out of n Visual Secret Sharing Schemes[J]. Designs Codes & Cryptography (S1573-7586), 1997, 11(2): 179-196. [3] Stelvio Cimato, Roberto De Prisco, Santis A D.Optimal Colored Threshold Visual Cryptography Schemes[J]. Designs, Codes and Cryptography (S1573-7586), 2005, 35(3): 311-335. [4] Cimato S, De Prisco R, De Santis A.Colored Visual Cryptography Without Color Darkening[J]. Security in Communication Networks (S0302-9743), 2005, 374: 261-276. [5] Yamamoto H.Proposal of a Lattice-based Visual Secret Sharing Scheme for Color and Gray-scale Images[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (S0916-8508), 1998, 81(6): 1262-1269. [6] Hou Y C.Visual Cryptography for Color Images[J]. Pattern Recognition (S0031-3203), 2003, 36(7): 1619-1629. [7] Chen T, Tsao K.Threshold Visual Secret Sharing by Random Grids[J]. Journal of System & Software (S0164-1212), 2011, 84(7): 1197-1208. [8] Lukac R, Plataniotis K N.Colour Image Secret Sharing[J]. Electronics Letters (S0013-5194), 2004, 40(9): 529-531. [9] Lukac R, Plataniotis K N.Bit-level based Secret Sharing for Image Encryption[J]. Pattern Recognition, 2005, 38(5): 767-772. [10] Lukac R, Plataniotis K N.A Color Image Secret Sharing Scheme Satisfying the Perfect Reconstruction Property[C]//Multimedia Signal Processing, 2004 IEEE 6th Workshop on USA: IEEE, 2004: 351-354. [11] Wang D, Zhang L, Ma N, et al.Two Secret Sharing Schemes based on Boolean Operations[J]. Pattern Recognition (S0031-3203), 2007, 40(10): 2776-2785. [12] Dong L, Wang D, Li S, et al.(2, n ) Secret Sharing Scheme for Gray and Color Images based on Boolean Operation[J]. Science in China (S1869-1919), 2012, 55(5): 1151-1161. [13] Chao K, Lin J.Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approached[J]. International Journal of Pattern Recognition & Artificial Intelligence, 2011, 23(2): 263-285. [14] Kumar S, Sharma R K.Threshold Visual Secret Sharing based on Boolean Operations[J]. Security & Communication Networks, 2014, 7(3): 653-664. |