Watermarking-Based Transparency Authentication in Visual Cryptography
暂无分享,去创建一个
Jeng-Shyang Pan | Zhe-Ming Lu | Hao Luo | Bin-Yih Liao | Jeng-Shyang Pan | Hao Luo | Zhe-ming Lu | Bin-Yih Liao
[1] L. Jain,et al. Intelligent and watermarking techniques , 2004 .
[2] Lakhmi C. Jain,et al. Intelligent Watermarking Techniques: (With CD-ROM) , 2004 .
[3] Chang-Chou Lin,et al. Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..
[4] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[5] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[6] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[7] Mohan S. Kankanhalli,et al. Progressive color visual cryptography , 2005, J. Electronic Imaging.
[8] Moni Naor,et al. Visual cryptography for grey level images , 2000, Inf. Process. Lett..