Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Edge directed automatic control point selection algorithm for image morphing , 2013 .
[2] Nicolas Passat,et al. Topology Preserving Warping of 3-D Binary Images According to Continuous One-to-One Mappings , 2011, IEEE Transactions on Image Processing.
[3] Aljoscha Smolic,et al. Automatic View Synthesis by Image-Domain-Warping , 2013, IEEE Transactions on Image Processing.
[4] Hao-Kuan Tso,et al. Friendly Medical Image Sharing Scheme , 2014, J. Inf. Hiding Multim. Signal Process..
[5] Harsh K. Verma,et al. Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n)-VCS , 2012 .
[6] Xiaobo Li,et al. Towards Shift Tolerant Visual Secret Sharing Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[7] Ching-Nung Yang,et al. Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..
[8] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[9] Mitsugu Iwamoto. A Weak Security Notion for Visual Secret Sharing Schemes , 2012, IEEE Transactions on Information Forensics and Security.
[10] Lei Zhu,et al. An Image Morphing Technique Based on Optimal Mass Preserving Mapping , 2007, IEEE Transactions on Image Processing.
[11] Chao-Hung Lin,et al. Patch-Based Image Warping for Content-Aware Retargeting , 2013, IEEE Transactions on Multimedia.
[12] Thaddeus Beier,et al. Feature-based image metamorphosis , 1992, SIGGRAPH.
[13] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Wei Sun,et al. Generalized Random Grid and Its Applications in Visual Cryptography , 2013, IEEE Transactions on Information Forensics and Security.
[16] Pei-Ling Chiu,et al. An Extended Visual Cryptography Algorithm for General Access Structures , 2012, IEEE Transactions on Information Forensics and Security.
[17] Heung-Kyu Lee,et al. Color extended visual cryptography using error diffusion , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[18] Chin-Chen Chang,et al. Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..
[19] Chien-Chang Chen,et al. An Expandable Essential Secret Image Sharing Structure , 2016, J. Inf. Hiding Multim. Signal Process..
[20] Chin-Chen Chang,et al. Meaningful secret sharing technique with authentication and remedy abilities , 2011, Inf. Sci..
[21] George Wolberg,et al. Skeleton-based image warping , 2005, The Visual Computer.
[22] Tzung-Her Chen,et al. User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[23] Shyong Jian Shyu,et al. Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..
[24] Wei Sun,et al. Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..
[25] Pei-Ling Chiu,et al. Digital Image Sharing by Diverse Image Media , 2014, IEEE Transactions on Information Forensics and Security.
[26] Ran-Zan Wang,et al. Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.
[27] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.