WEB-VC: Visual Cryptography for Web Image
暂无分享,去创建一个
[1] Tom Yeh,et al. CraftML: 3D Modeling is Web Programming , 2018, CHI.
[2] Bin Yu,et al. Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..
[3] Yi-Chong Zeng,et al. High capacity multi-scale image sharing scheme by combining visual cryptography with data hiding , 2013, 2013 IEEE International Conference on Image Processing.
[4] S. Manimurugan,et al. A Survey on Various Visual Secret Sharing Schemes with an Application , 2012 .
[5] Bin Yu,et al. General construction for XOR-based visual cryptography and its extended capability , 2016, Multimedia Tools and Applications.
[6] Ja-Chen Lin,et al. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..
[7] Wei Sun,et al. Non-expansible XOR-based visual cryptography scheme with meaningful shares , 2015, Signal Process..
[8] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[9] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[10] Ali Mesbah,et al. Discovering refactoring opportunities in cascading style sheets , 2014, SIGSOFT FSE.
[11] Punt Leonard,et al. The A?B*A Pattern: Undoing Style in CSS and Refactoring Opportunities It Presents , 2016 .
[12] Takamichi Saito,et al. Web Browser Fingerprinting Using Only Cascading Style Sheets , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).
[13] Yu-Chi Chen,et al. Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure , 2017, IEEE Transactions on Information Forensics and Security.
[14] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[15] Ja-Chen Lin,et al. All-in-one visual and computer decoding of multiple secrets: translated-flip VC with polynomial-style sharing , 2017 .
[16] Masaaki Fujiyoshi,et al. A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[17] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[18] Suneeta Agarwal,et al. Progressive Visual Cryptography with Unexpanded Meaningful Shares , 2016, TOMM.
[19] M. Sukumar Reddy,et al. Visual Cryptography Scheme for Secret Image Retrieval , 2014 .
[20] Banu Diri,et al. Defect prediction for Cascading Style Sheets , 2016, Appl. Soft Comput..
[21] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..