Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach
暂无分享,去创建一个
[1] Nilanjan Dey,et al. Digital Analysis of Microscopic Images in Medicine , 2015 .
[2] S. S. Chaudhuri,et al. Detection and measurement of arc of lumen calcification from intravascular ultrasound using Harris Corner detection , 2012, 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS.
[3] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[4] Nilanjan Dey,et al. Firefly Algorithm for Optimization of Scaling Factors During Embedding of Manifold Medical Information: An Application in Ophthalmology Imaging , 2014 .
[5] Filippo Molinari,et al. Shape‐Based Approach for Coronary Calcium Lesion Volume Measurement on Intravascular Ultrasound Imaging and Its Association With Carotid Intima‐Media Thickness , 2015, Journal of ultrasound in medicine : official journal of the American Institute of Ultrasound in Medicine.
[6] Masatsugu Tsuji,et al. Impact of ICT on Innovation , 2020, Disruptive Technology.
[7] Feng Liu,et al. Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..
[8] Nilanjan Dey,et al. Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search , 2013, Int. J. Bio Inspired Comput..
[9] Young-Chang Hou,et al. Progressive Visual Cryptography With Unexpanded Shares , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Alfredo De Santis,et al. On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..
[11] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[12] Ralph R. Martin,et al. Structure Aware Visual Cryptography , 2014, Comput. Graph. Forum.
[13] Gwoboa Horng,et al. A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..
[14] Nilanjan Dey,et al. Embedding of Blink Frequency in Electrooculography Signal using Difference Expansion based Reversible Watermarking Technique , 2013, ArXiv.
[15] Minvydas Ragulskis,et al. Dynamic visual cryptography for optical assessment of chaotic oscillations , 2014 .
[16] Wen-Guey Tzeng,et al. A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..
[17] Feng Liu,et al. K out of K Extended Visual Cryptography Scheme by Random Grids , 2014, Signal Process..
[18] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[19] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[20] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[21] Gwoboa Horng,et al. Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.
[22] Nilanjan Dey,et al. Wavelet Based Normal and Abnormal Heart Sound Identification using Spectrogram Analysis , 2012, ArXiv.
[23] Nilanjan Dey,et al. Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..
[24] Jasjit S. Suri,et al. Effect of Geometric-Based Coronary Calcium Volume as a Feature Along with its Shape-Based Attributes for Cardiological Risk Prediction from Low Contrast Intravascular Ultrasound , 2014 .
[25] Rastislav Lukac,et al. Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.
[26] Gwoboa Horng,et al. A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography , 2012, J. Vis. Commun. Image Represent..
[27] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[28] Balasubramanian Raman,et al. A blind watermarking algorithm based on fractional Fourier transform and visual cryptography , 2012, Signal Process..
[29] Kazi Md. Rokibul Alam,et al. An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications , 2013 .
[30] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[31] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[32] Shyamalendu Kandar,et al. Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking , 2011 .
[33] Feng Liu,et al. Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..
[34] Pei-Ling Chiu,et al. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.