Perfect recovery of XOR-based visual cryptography scheme
暂无分享,去创建一个
[1] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[2] Lyle H. Ungar,et al. Beyond Binary Labels: Political Ideology Prediction of Twitter Users , 2017, ACL.
[3] Ching-Nung Yang,et al. Visual Cryptography Schemes with Reversing , 2008, Comput. J..
[4] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[5] Li Liu,et al. Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.
[6] Shyong Jian Shyu,et al. Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[7]
Ching-Nung Yang,et al.
[8] Luming Zhang,et al. Fortune Teller: Predicting Your Career Path , 2016, AAAI.
[9] David S. Rosenblum,et al. From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.
[10] Yu-Chi Chen,et al. Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure , 2017, IEEE Transactions on Information Forensics and Security.
[11] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[12] Bin Yu,et al. Optimal pixel expansion of deterministic visual cryptography scheme , 2013, Multimedia Tools and Applications.
[13] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[14] Ja-Chen Lin,et al. Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches , 2009, Int. J. Pattern Recognit. Artif. Intell..
[15] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[16] Luming Zhang,et al. Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.
[17] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..