K out of K Extended Visual Cryptography Scheme by Random Grids
暂无分享,去创建一个
[1] Feng Liu,et al. The alignment problem of visual cryptography schemes , 2009, Des. Codes Cryptogr..
[2] Alfredo De Santis,et al. Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..
[3] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[4] Ching-Nung Yang,et al. $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..
[5] Tzung-Her Chen,et al. Insight into collusion attacks in random-grid-based visual secret sharing , 2012, Signal Process..
[6] Shyong Jian Shyu,et al. Image encryption by random grids , 2007, Pattern Recognit..
[7] Shyong Jian Shyu,et al. Image encryption by multiple random grids , 2009, Pattern Recognit..
[8] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[9] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[10] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[11] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[12] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[13] Xiaobo Li,et al. Towards Shift Tolerant Visual Secret Sharing Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[14] Feng Liu,et al. Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..
[15] Shyong Jian Shyu,et al. Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Tzung-Her Chen,et al. (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .
[17] Thierry Fournel,et al. Two-out-of-two color matching based visual cryptography schemes. , 2012, Optics express.
[18] Gwoboa Horng,et al. Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.
[19] Mausumi Bose,et al. Optimal (k, n) visual cryptographic schemes for general k , 2010, Des. Codes Cryptogr..
[20] Daniel L. Lau,et al. Modern Digital Halftoning , 2001 .
[21] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[22] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[23] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[24] Xiaotian Wu,et al. Random grid-based visual secret sharing for general access structures with cheat-preventing ability , 2012, J. Syst. Softw..
[25] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[26] Mausumi Bose,et al. Optimal (2, n) visual cryptographic schemes , 2006, Des. Codes Cryptogr..
[27] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[28] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[29] Tzung-Her Chen,et al. Visual secret sharing by random grids revisited , 2009, Pattern Recognit..
[30] Tzung-Her Chen,et al. User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[31] Feng Liu,et al. Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..
[32] Feng Liu,et al. On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.
[33] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[34] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[35] Ran-Zan Wang,et al. Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.
[36] Feng Liu,et al. Multi-pixel Encryption Visual Cryptography , 2011, Inscrypt.