Papers on Visual Cryptography

Publications:

  • A Neural-Network Approach for Visual Cryptography and Authorization   [Slide]
    by Tai-Wen Yue, Suchen Chiang, Proceedings of Design and Application of Hybridization of Intelligent Systems 2003, pp. 993-1002, December 14-17, 2003.
  • Quench, Gola-Matching and Converge --- The Three-Phase Reasoning of a Q'tron Neural Network
    by Tai-Wen Yue, Suchen Chiang, Proceedings of IASTED International  Conference on Artificial and Computational Intelligence, pp. 54-59, September 2002.
  • A Goal-Driven Approach for Combinatorial Optimization Using Q'tron Neural Networks
    by Tai-Wen Yue, Zou Zhong Lee, Proceedings of IASTED International  Conference on Artificial and Computational Intelligence, pp. 60-64, September 2002.
  • A Known-Energy Neural Network Approach for Visual Cryptograph
    by Tai-Wen Yue, Suchen Chiang, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, Vol. 4, pp. 2542-2547, July 2001.
  • The General Neural-Network Paradigm for Visual Cryptograph    [Slide]
    by Tai-Wen Yue, Suchen Chiang, IWANN 2001, LNCS 2048, Page(s):196-206, 2001.
  • A Neural Network Approach for Visual Cryptography    [Slide]
    by Tai-Wen Yue, Suchen Chiang, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, Vol. 5, pp. 494-499, July 2000.
  • Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes    [Slide]
    by Suchen Chiang, Tai-Wen Yue, Proceedings of the ISCA 13th International Conference on Computer Applications in Industry and Engineering, pp. 281-286, November 2000.
  •  

    References:

  • Constructions and Bounds for Visual Cryptography
    by G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, in "23rd International Colloquium on Automata, Languages and Programming" (ICALP '96), F. M. auf der Heide and B. Monien Eds., Vol. 1099 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 416-428. 1996.
  • Visual Cryptography for General Access Structures
    by G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106
  • Extended Scheme for Visual Cryptography
    by G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Theoretical Computer Science , 1996
  • New Results on Visual Cryptography
    by S. Droste, Advances in Cryptology - CRYPTO '96, N. Koblitz Ed., Vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 401-415, 1996.
  • Visual Cryptography
    by Naor and A. Shamir, Advances in Cryptology - EUROCRYPT '94, A. De Santis Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1-12, 1995.
  • Visual Authentication and Identification
    by M. Naor and Benny Pinkas, Advances in Cryptology - CRYPTO '97", B. Kaliski Jr. Ed., Vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 322-336, 1997.
  • Authentication for Remote Voting
    by N. Paul, D. Evans, A. Rubin and D. Wallach. Workshop on Human-Computer Interaction and Security Systems, 6 April 2003.