Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye
暂无分享,去创建一个
Jong-Uk Hou | Hyun-Ji Song | Heung-Kyu Lee | Dongkyu Kim | Heung-Kyu Lee | Jong-Uk Hou | Dongkyu Kim | Hyungseok Song
[1] Mark Stamp,et al. Digital Rights Management: The Technology Behidn The Hype , 2003 .
[2] David M. Nicol,et al. TrustGraph: Trusted Graphics Subsystem for High Assurance Systems , 2009, 2009 Annual Computer Security Applications Conference.
[3] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[4] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] J Reimer Wolter,et al. Adler's Physiology of the Eye , 1971 .
[7] Ton Kalker,et al. Chapter 12 – Steganography , 2008 .
[8] Mark Stamp,et al. Digital Rights Management: The Technology Behind the Hype , 2003, J. Electron. Commer. Res..
[9] Francis Heed Adler,et al. Adler's Physiology of the eye;: Clinical application , 1976 .
[10] Hirotsugu Yamamoto,et al. Secure information display with limited viewing zone by use of multi-color visual cryptography. , 2004, Optics express.
[11] H Kolb,et al. Temporal Resolution -- Webvision: The Organization of the Retina and Visual System , 1995 .
[12] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[13] A. D. Santis. Advances in cryptology, EUROCRYPT '94 : Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings , 1995 .
[14] Eduardo Fernández,et al. Webvision: The Organization of the Retina and Visual System , 1995 .
[15] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[16] Heung-Kyu Lee,et al. Screenshot identification by analysis of directional inequality of interlaced video , 2012, EURASIP J. Image Video Process..
[17] H DE LANGE DZN,et al. Research into the dynamic nature of the human fovea-cortex systems with intermittent and modulated light. I. Attenuation characteristics with white and colored light. , 1958, Journal of the Optical Society of America.
[18] Xiangyu Wang,et al. Protecting against screenshots: An image processing approach , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Sue Gregory,et al. Snapchat 'selfies': The case of disappearing data , 2014 .
[20] Craig Metz,et al. A One-Time Password System , 1996, RFC.