Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options
暂无分享,去创建一个
Zhangjie Fu | Ching-Nung Yang | Xiaotian Wu | Yung-Chien Chou | Ching-Nung Yang | Zhangjie Fu | Xiaotian Wu | Yung-Chien Chou
[1] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Wei Sun,et al. Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..
[3] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[4] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[5] Feng Liu,et al. Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..
[6] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[7] Xingming Sun,et al. Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation , 2016, IEICE Trans. Inf. Syst..
[8] Marc Joye,et al. Chinese Remaindering Based Cryptosystems in the Presence of Faults , 1999, Journal of Cryptology.
[9] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[10] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[11] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[12] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[13] Wei Sun,et al. Reversible AMBTC-based secret sharing scheme with abilities of two decryptions , 2014, J. Vis. Commun. Image Represent..
[14] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[15] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[16] WeiQi Yan,et al. A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..
[17] Bin Yu,et al. Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..
[18] Pei-Ling Chiu,et al. An Extended Visual Cryptography Algorithm for General Access Structures , 2012, IEEE Transactions on Information Forensics and Security.
[19] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[20] Xiaobo Li,et al. On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..
[21] Wei Sun,et al. Generalized Random Grid and Its Applications in Visual Cryptography , 2013, IEEE Transactions on Information Forensics and Security.
[22] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[23] Heung-Kyu Lee,et al. Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.
[24] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[25] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[26] Wei Sun,et al. Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.
[27] Chang-Chou Lin,et al. Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..
[28] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[29] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[30] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[31] Wei Sun,et al. Visual secret sharing for general access structures by random grids , 2012, IET Inf. Secur..
[32] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.