On Real-valued Visual Cryptographic Basis Matrices
暂无分享,去创建一个
Atulya K. Nagar | Neil Buckley | Subramanian Arumugam | A. Nagar | S. Arumugam | Neil Buckley | S. Arumugam | Atulya K. Nagar
[1] Jaime Nava,et al. Least sensitive (most robust) fuzzy “exclusive or” operations , 2011, 2011 Annual Meeting of the North American Fuzzy Information Processing Society.
[2] Robert Ulichney,et al. Void-and-cluster method for dither array generation , 1993, Electronic Imaging.
[3] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[4] Xiaobo Li,et al. Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..
[5] Hans Ulrich Simon,et al. Contrast-optimal k out of n secret sharing schemes in visual cryptography , 1997, Theor. Comput. Sci..
[6] Chin-Chen Chang,et al. Reversible Visual Secret Sharing Based on Random Grids for Two-Image Encryption , 2013 .
[7] V. Seenivasagam,et al. Feed Forward Networks in Color Extended Visual Cryptography to Generate Meaningful Shares , 2015 .
[8] Naosuke Ino. “ 4 . 3 : An Adaptive Algorithm for Spatial Grey Scale , 2017 .
[9] Hirosuke Yamamoto,et al. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images , 1998 .
[10] Atulya K. Nagar,et al. On (k, n)*-visual cryptography scheme , 2014, Des. Codes Cryptogr..
[11] Wei Sun,et al. Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..
[12] Daisuke Sakai,et al. High-chroma visual cryptography using interference color of high-order retarder films , 2015 .
[13] Moni Naor,et al. Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.
[14] Rastislav Lukac,et al. Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.
[15] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[16] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[17] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[18] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[19] Stelvio Cimato,et al. Optimal Colored Threshold Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[21] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[22] Stelvio Cimato,et al. Colored visual cryptography without color darkening , 2004, Theor. Comput. Sci..
[23] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[24] Alfredo De Santis,et al. Constructions and Bounds for Visual Cryptography , 1996, ICALP.
[25] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[26] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[27] Somnath Sikdar,et al. A New (2, n)-Visual Threshold Scheme for Color Images , 2003, INDOCRYPT.
[28] Shyong Jian Shyu,et al. Image encryption by multiple random grids , 2009, Pattern Recognit..
[29] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.