A Comprehensive Study on Various Visual cryptography Schemes with an Application
暂无分享,去创建一个
[1] Azzam Sleit. A Visual Cryptography Based Watermark Technology for Individual and Group Images , 2007 .
[2] Mahmoud A. Hassan,et al. Self Watermarking based on Visual Cryptography , 2007 .
[3] Pei-Ling Chiu,et al. A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..
[4] Yen-Ping Chu,et al. A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..
[5] Tzung-Her Chen,et al. Visual secret sharing by random grids revisited , 2009, Pattern Recognit..
[6] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[7] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[8] Ren-Junn Hwang,et al. A Digital Image Copyright Protection Scheme Based on Visual Cryptography , 2000 .
[9] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[10] Der-Chyuan Lou,et al. A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares , 2011, Displays.
[11] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[12] Gwoboa Horng,et al. A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..
[13] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[14] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[15] Young-Chang Hou,et al. An asymmetric watermarking scheme based on visual cryptography , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.
[16] Jen-Bang Feng,et al. Visual secret sharing for multiple secrets , 2008, Pattern Recognit..
[17] S-F Tua,et al. Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images , 2007 .
[18] Ja-Ling Wu,et al. Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.
[19] Alfredo De Santis,et al. Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..
[20] Kuang Tsan Lin. Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.