Secure image transmission based on visual cryptography scheme and artificial neural network-particle swarm optimization-guided adaptive vector quantization
暂无分享,去创建一个
[1] Xiaobo Li,et al. Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..
[2] Shyong Jian Shyu,et al. Image encryption by random grids , 2007, Pattern Recognit..
[3] Her-Chang Chao,et al. User-friendly XOR-based visual secret sharing by random grid , 2018, IET Inf. Secur..
[4] Wei Su,et al. Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Weiming Zhang,et al. Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.
[6] Stelvio Cimato,et al. Visual cryptography schemes with optimal pixel expansion , 2006, Theor. Comput. Sci..
[7] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[8] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[9] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.
[10] H.C.A. van Tilborg,et al. A construction of a k out of n visual secret sharing scheme , 1997 .
[11] Feng Liu,et al. Optimal XOR Based (2, n)-Visual Cryptography Schemes , 2014, IWDW.
[12] Chang-Chou Lin,et al. Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..
[13] Xuehu Yan,et al. Meaningful visual secret sharing based on error diffusion and random grids , 2015, Multimedia Tools and Applications.
[14] Alfredo De Santis,et al. On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..
[15] Moni Naor,et al. Visual cryptography for grey level images , 2000, Inf. Process. Lett..
[16] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[17] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[18] Wen-Hsiang Tsai,et al. Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques , 2010, IEEE Transactions on Information Forensics and Security.
[19] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[20] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[21] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[22] Tong Liu,et al. Improving the visual quality of random grid-based visual secret sharing via error diffusion , 2013, J. Vis. Commun. Image Represent..
[23] Wei Sun,et al. Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..
[24] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[25] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[26] Alwyn Roshan Pais,et al. Randomised visual secret sharing scheme for grey-scale and colour images , 2018, IET Image Process..
[27] Ja-Chen Lin,et al. Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches , 2009, Int. J. Pattern Recognit. Artif. Intell..
[28] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[29] Vascan O. Orest,et al. Improving vector quantization in image compression with Hilbert scan , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).
[30] Jayanta K. Chandra,et al. Quantum signal processing-based visual cryptography with unexpanded shares , 2015, J. Electronic Imaging.
[31] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[32] Alfredo De Santis,et al. Color visual cryptography schemes for black and white secret images , 2013, Theor. Comput. Sci..
[33] Wei Sun,et al. Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..
[34] Pei-Ling Chiu,et al. Digital Image Sharing by Diverse Image Media , 2014, IEEE Transactions on Information Forensics and Security.
[35] Chong Fu,et al. Medical image protection using hyperchaos-based encryption , 2015, 2015 9th International Symposium on Medical Information and Communication Technology (ISMICT).
[36] Wei Sun,et al. Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.
[37] Ching-Nung Yang,et al. Extended color visual cryptography for black and white secret image , 2016, Theor. Comput. Sci..
[38] Bin Yu,et al. Perfect recovery of XOR-based visual cryptography scheme , 2018, Multimedia Tools and Applications.
[39] Douglas R. Stinson,et al. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..
[40] Mingjun Wei,et al. Double-feedback image encryption based on chaotic dynamic grouping of FRFT , 2016, 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC).
[41] Xuehu Yan,et al. Threshold progressive visual cryptography construction with unexpanded shares , 2015, Multimedia Tools and Applications.
[42] Rohit Srivastava,et al. Hierarchical visual cryptography for grayscale image , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[43] Bin Yu,et al. Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..
[44] 張兆源,et al. 彩色影像視覺密碼之製作; Visual Cryptography for Color Images , 2000 .
[45] Shih-Chieh Wei,et al. Random-Grid-Based Visual Cryptography Schemes , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[46] Yasushi Yamaguchi,et al. Extended Visual Cryptography for Natural Images , 2002, WSCG.
[47] Fernando Pérez-González,et al. Digital-Forensics and Watermarking , 2014, Lecture Notes in Computer Science.
[48] Feng Liu,et al. Colour visual cryptography schemes , 2008, IET Inf. Secur..
[49] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[50] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..
[51] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[52] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[53] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.