[1]
Naor M and Shamir A, Visual cryptography, " Proceedings of Advances in Cryptology-Eurocrypt, 94, Berlin, Spinger, pp.179-196, (1995).
Google Scholar
[2]
Ateniese G, Blundo C, De Santis A and Stinson D.R., Visual cryptography for general access structures, Information and Computation, vol. 129(2), pp.86-106, (1996).
DOI: 10.1006/inco.1996.0076
Google Scholar
[3]
Verheul E R and Van Tilborg H C A, Constructions and properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, vol. 11, pp.179-196, (1997).
DOI: 10.1023/a:1008280705142
Google Scholar
[4]
Feng YI, WANG D S, LUO P, et al, Multi secret image color visual cryptography schemes for general access structures, Progress in Natural Science, vol. 16(4), pp.431-436, (2006).
DOI: 10.1080/10020070612330015
Google Scholar
[5]
Chor, B. Goldwasser, S. Micali, et al, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,. Proc. 26th IEEE Symposium. On Foundations of Computer Science, pp.372-382, (1985).
DOI: 10.1109/sfcs.1985.64
Google Scholar
[6]
P. Feldman, a Practical Scheme for Non-interactive Verifiable Secret Sharing,. Proc. 28th IEEE Symposium on Foundation of Computer Science, IEEE Computer Society, pp.427-437, (1987).
DOI: 10.1109/sfcs.1987.4
Google Scholar
[7]
T.P. Pedersen, Distributed Provers and Verifiable Secret Sharing Based on Discrete Logarithm Problem,. PhD Thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, (1992).
DOI: 10.7146/dpb.v21i388.6621
Google Scholar
[8]
T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing". Advances in Cryptology-CRYPTO, 91, Lecture Notes in Computer Science, vol. 576, pp.129-140, (1992).
DOI: 10.1007/3-540-46766-1_9
Google Scholar
[9]
Theodore M. Wong, Chenxi Wang, Jeannette M. Wing, Verifiable secret Redistribution for Threshold Sharing Schemes,. Carnegie Mellon University Technical Report CMU-CS-02-114, February (2002).
DOI: 10.21236/ada461227
Google Scholar
[10]
C.L. Hsu, T.C. Wu. Authenticated Encryption Scheme with (t, n) Shared Verification,. IEE. Proc. Computer. digit. tech, vol. 145(2), pp.117-120, (1998).
DOI: 10.1049/ip-cdt:19981905
Google Scholar
[11]
Talal Mousa Alkharobi, Secret sharing using artificial neural networks, Texas A&M University. pp.51-60, (2004).
Google Scholar
[12]
Ghosh J and Shin Y, Efficient higher-order neural networks for classification and function approximation, Int J Neural Syst, vol. 4(3), pp.323-350, (1992).
DOI: 10.1142/s0129065792000255
Google Scholar
[13]
Duch W and Jankowski N, Survey of neural of neural transfer function, Neural Comput Surv, vol. 2(1), pp.163-212, (1992).
Google Scholar
[14]
Schmitt M, On the complexity of computing and learning with multiplicative neurous, Neural Comput, vol. 14(2), pp.241-301, (2002).
Google Scholar
[15]
M. Bellare, P. Rogaway, the Exact Security of Digital Signatures—How to Sign with RSA and Rabin". In U. Maurer, editor, Advances in Cryptology—Proceedings of EUROCRYPT, 96, Lecture Notes in Computer Science 1070, pp.199-416, (1996).
DOI: 10.1007/3-540-68339-9_34
Google Scholar
[16]
Gonzalez R.C. and Woods R.E. Digital Image Processing(Second Edition). BeiJing: Publishing House of Electronics Industry, (2007).
Google Scholar
[17]
Song Ge, Peng Changgen. Visual Cryptography Scheme Using Pi-sigma Neural Networks. 2008 International Symposium on Computer Science and Computational Technology proceedings (ISCSCT2008),pp.679-682.
DOI: 10.1109/isise.2008.208
Google Scholar