Feature and Future of Visual Cryptography Based Schemes
暂无分享,去创建一个
[1] Hideki Imai,et al. An extended construction method for visual secret sharing schemes , 1998 .
[2] Mahmoud A. Hassan,et al. Self Watermarking based on Visual Cryptography , 2007 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[5] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[6] Wen-Guey Tzeng,et al. A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..
[7] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[8] Young-Chang Hou,et al. An asymmetric watermarking scheme based on visual cryptography , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.
[9] Zhongmin Wang,et al. Halftone Visual Cryptography Through Error Diffusion , 2006, 2006 International Conference on Image Processing.
[10] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[11] Ching-Nung Yang,et al. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality , 2007, Int. J. Pattern Recognit. Artif. Intell..
[12] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[13] Chin-Chen Chang,et al. Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.
[14] Yen-Ping Chu,et al. A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..
[15] Ching-Nung Yang,et al. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion , 2005, Pattern Recognit. Lett..
[16] Ching-Nung Yang,et al. New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..
[17] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[18] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[19] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[20] Ran-Zan Wang,et al. Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..
[21] Stelvio Cimato,et al. Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..
[22] Alfredo De Santis,et al. Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..
[23] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[24] Moni Naor,et al. Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.
[25] Oscar C. Au,et al. A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (DHCED) , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[26] Ching-Nung Yang,et al. Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions , 2006, ICIAR.
[27] Ching-Nung Yang,et al. Real Perfect Contrast Visual Secret Sharing Schemes with Reversing , 2006, ACNS.
[28] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[29] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[30] Mohamed S. Kamel,et al. Image Analysis and Recognition , 2014, Lecture Notes in Computer Science.
[31] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[32] Tung-Shou Chen,et al. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[33] Ja-Ling Wu,et al. Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.
[34] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[35] Adam Finkelstein,et al. Real-time hatching , 2001, SIGGRAPH.
[36] Ching-Nung Yang,et al. Size-Adjustable Visual Secret Sharing Schemes , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[37] Yasuhiro Takishima,et al. Visual Cryptography Based on Void-And-Cluster Halftoning Technique , 2006, 2006 International Conference on Image Processing.
[38] Ren-Junn Hwang,et al. A Digital Image Copyright Protection Scheme Based on Visual Cryptography , 2000 .
[39] Mohan S. Kankanhalli,et al. Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[40] Jeng-Shyang Pan,et al. Hiding Multiple Watermarks in Transparencies of Visual Cryptography , 2007 .
[41] Ina Koch,et al. Enumerating all connected maximal common subgraphs in two graphs , 2001, Theor. Comput. Sci..
[42] Daniel L. Lau,et al. Modern Digital Halftoning , 2001 .
[43] Ching-Nung Yang,et al. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[44] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[45] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[46] Yasuhiro Takishima,et al. Halftone Visual Cryptography Embedding a Natural Grayscale Image Based on Error Diffusion Technique , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[47] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[48] Henry R. Kang. Digital Color Halftoning , 1999 .
[49] Tzung-Her Chen,et al. (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .
[50] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[51] Susanne Wetzel,et al. Traceable visual cryptography , 1997, ICICS.
[52] Yasushi Yamaguchi,et al. Extended Visual Cryptography for Natural Images , 2002, WSCG.
[53] Robert Ulichney,et al. Digital Halftoning , 1987 .