XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes
暂无分享,去创建一个
[1] Bin Yu,et al. Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..
[2] Peng Li,et al. A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..
[3] Ching-Nung Yang,et al. Developing Visual Cryptography for Authentication on Smartphones , 2016, SocInfo 2016.
[4] Xuehu Yan,et al. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery , 2013, Multimedia Tools and Applications.
[5] Wei Sun,et al. Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..
[6] Yang-Wai Chow,et al. Cooperative Secret Sharing Using QR Codes and Symmetric Keys , 2018, Symmetry.
[7] Feng Liu,et al. 2D Barcodes for visual cryptography , 2014, Multimedia Tools and Applications.
[8] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[9] WeiQi Yan,et al. Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.
[10] Bin Yu,et al. Improved Visual Secret Sharing Scheme for QR Code Applications , 2018, IEEE Transactions on Information Forensics and Security.
[11] James G. Phillips,et al. Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing , 2016, ACISP.
[12] Bin Yu,et al. Visual Cryptography Scheme With Meaningful Shares Based on QR Codes , 2018, IEEE Access.
[13] Song Wan,et al. Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).
[14] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[15] Xuehu Yan,et al. Threshold construction from specific cases in visual cryptography without the pixel expansion , 2014, Signal Process..
[16] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..
[17] Xin Liu,et al. An enhanced threshold visual secret sharing based on random grids , 2015, Journal of Real-Time Image Processing.
[18] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[19] Amel Benazza-Benyahia,et al. Efficient transform-based texture image retrieval techniques under quantization effects , 2016, Multimedia Tools and Applications.
[20] Liu Yingying,et al. Two-level information management scheme based on visual cryptography and QR code , 2016 .
[21] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[22] Yuliang Lu,et al. Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).
[23] Damri Samretwit,et al. Measurement of Reading Characteristics of Multiplexed Image in QR Code , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.