Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
暂无分享,去创建一个
Ching-Nung Yang | Xuehu Yan | Shen Wang | Xiamu Niu | X. Niu | Ching-Nung Yang | Shen Wang | Xuehu Yan
[1] Yasushi Yamaguchi,et al. Extended Visual Cryptography for Natural Images , 2002, WSCG.
[2] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[3] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[4] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Daniel L. Lau,et al. Modern Digital Halftoning , 2001 .
[6] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[7] Gonzalo R. Arce,et al. Alpha stable human visual system models for digital halftoning , 2006, Electronic Imaging.
[8] Jeng-Shyang Pan,et al. Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[9] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..
[10] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[11] Shyong Jian Shyu,et al. Image encryption by random grids , 2007, Pattern Recognit..
[12] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[13] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[14] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[15] Xiaobo Li,et al. On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..
[16] Feng Liu,et al. Colour visual cryptography schemes , 2008, IET Inf. Secur..
[17] Tzung-Her Chen,et al. User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[19] Alfredo De Santis,et al. Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..
[20] Pheng-Ann Heng,et al. Structure-aware halftoning , 2008, SIGGRAPH 2008.
[21] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[22] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[23] S. Govindaraju,et al. Visual Secret Sharing Schemes for Color Images Using Halftoning , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[24] Gwoboa Horng,et al. On generating meaningful shares in visual secret sharing scheme , 2008 .
[25] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[26] Jan P. Allebach,et al. Model-based halftoning using direct binary search , 1992, Electronic Imaging.
[27] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[28] Daniel L. Lau,et al. Modern Digital Halftoning, Second Edition , 2007 .
[29] WeiQi Yan,et al. A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..
[30] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[31] Ran-Zan Wang,et al. Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..
[32] Douglas R. Stinson,et al. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..
[33] Jan P. Allebach,et al. Impact of HVS models on model-based halftoning , 2002, IEEE Trans. Image Process..
[34] Ching-Nung Yang,et al. New extended visual cryptography schemes with clearer shadow images , 2014, Inf. Sci..
[35] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[36] Stelvio Cimato,et al. Probabilistic Visual Cryptography Schemes , 2006, Comput. J..
[37] Robert Ulichney,et al. Void-and-cluster method for dither array generation , 1993, Electronic Imaging.