Authenticating Visual Cryptography Shares Using 2D Barcodes
暂无分享,去创建一个
[1] Susanne Wetzel,et al. Traceable visual cryptography , 1997, ICICS.
[2] Wei Qi Yan,et al. Image Hatching for Visual Cryptography , 2009, IMVIP.
[3] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[4] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[5] Marten van Dijk,et al. Visual Crypto Displays Enabling Secure Communications , 2003, SPC.
[6] WeiQi Yan,et al. Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[7] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[8] J. Rouillard,et al. Contextual QR Codes , 2008, 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008).
[9] Gwoboa Horng,et al. A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..
[10] Gwoboa Horng,et al. Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..
[11] Wei Qi Yan,et al. Dot-Size Variant Visual Cryptography , 2009, IWDW.
[12] Chin-Chen Chang,et al. Preventing Cheating in Computational Visual Cryptography , 2009, Fundam. Informaticae.
[13] K.R. Venugopal,et al. Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[14] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[15] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[16] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[17] Tzung-Her Chen,et al. (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .
[18] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[19] Mohan S. Kankanhalli,et al. Image Hatching for Visual Cryptography , 2009, 2009 13th International Machine Vision and Image Processing Conference.
[20] Alfredo De Santis,et al. Cheating Immune Threshold Visual Secret Sharing , 2010, Comput. J..
[21] Chih-Hao Lin,et al. A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography , 2008, ISI Workshops.
[22] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[23] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..