Review on Various Visual Cryptography Schemes
暂无分享,去创建一个
[1] Wen-Pinn Fang,et al. Non-expansion Visual Secret Sharing in Reversible Style , 2009 .
[2] Tzung-Her Chen,et al. Multi-image encryption by circular random grids , 2012, Inf. Sci..
[3] Tan Xiao-qing,et al. Two Kinds of Ideal Contrast Visual Cryptography Schemes , 2009, 2009 International Conference on Signal Processing Systems.
[4] WeiQi Yan,et al. Sharing multiple secrets using visual cryptography , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[5] M. Jenila Vincent,et al. Securing Multiple Color Secrets Using Visual Cryptography , 2012 .
[6] Heung-Kyu Lee,et al. Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.
[7] Feng Liu,et al. Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..
[8] Chih-Fong Tsai,et al. Block-based progressive visual secret sharing , 2013, Inf. Sci..
[9] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[10] Jie Zhang,et al. A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .
[11] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[12] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[13] P. Babu Anto,et al. Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.
[14] Giovanni Di Crescenzo,et al. Halftone visual cryptography via direct binary search , 2006, 2006 14th European Signal Processing Conference.
[15] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[16] Pei-Ling Chiu,et al. A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..
[17] Zhengxin Fu,et al. Research on Rotation Visual Cryptography Scheme , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[18] Neena Susan Alex,et al. Visual Cryptography Using Hybrid Halftoning , 2012 .