Perfect contrast XOR-based visual cryptography schemes via linear algebra
暂无分享,去创建一个
Bin Yu | Gang Shen | Feng Liu | Zhengxin Fu | Gang Shen | Zhengxin Fu | Bin Yu | Feng Liu
[1] Mohan S. Kankanhalli,et al. Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[2] Ching-Nung Yang,et al. Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , 2015, Digit. Signal Process..
[3] Alfredo De Santis,et al. Measure-independent characterization of contrast optimal visual cryptography schemes , 2013, J. Syst. Softw..
[4] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[5] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[6] Bin Yu,et al. Optimal pixel expansion of deterministic visual cryptography scheme , 2013, Multimedia Tools and Applications.
[7] Atulya K. Nagar,et al. On (k, n)*-visual cryptography scheme , 2014, Des. Codes Cryptogr..
[8] Ching-Nung Yang,et al. Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Feng Liu,et al. A new definition of the contrast of visual cryptography scheme , 2010, Inf. Process. Lett..
[10] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[11] Feng Liu,et al. Visual Cryptography for Natural Images and Visual Voting , 2012, Inscrypt.
[12] Shyong Jian Shyu,et al. Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Marten van Dijk,et al. Visual Crypto Displays Enabling Secure Communications , 2003, SPC.
[14] Alfredo De Santis,et al. Visual Cryptography for General Access Structures , 1996, Inf. Comput..
[15] Shyong Jian Shyu,et al. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.
[16] Xiaobo Li,et al. On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..
[17] Wen Wang,et al. On (k, n) Visual Cryptography Scheme with t Essential Parties , 2013, ICITS.
[18] Wei Sun,et al. Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.
[19] Avishek Adhikari,et al. Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images , 2013, Designs, Codes and Cryptography.
[20] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[21] WeiQi Yan,et al. A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..
[22] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[23] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[24] Shyong Jian Shyu,et al. Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..
[25] Kaoru Kurosawa,et al. Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.
[26] Stelvio Cimato,et al. Optimal Colored Threshold Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[27] Ching-Nung Yang,et al. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..
[28] Moni Naor,et al. Visual cryptography for grey level images , 2000, Inf. Process. Lett..
[29] Douglas R. Stinson,et al. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..
[30] Bin Yu,et al. Multi-secret visual cryptography with deterministic contrast , 2013, Multimedia Tools and Applications.
[31] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[32] Cheehang Park Park,et al. Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .
[33] Young-Chang Hou,et al. Visual cryptography for color images , 2003, Pattern Recognit..