Image hiding based on time-averaged fringes produced by non-harmonic oscillations
暂无分享,去创建一个
[1] Z. Navickas,et al. Representation of Time Averaged Vibrating Images in the Operator Format , 2007 .
[2] Sanjay Kumar Jena,et al. A Novel Visual Cryptography Scheme , 2009, 2009 International Conference on Advanced Computer Control.
[3] Alfred M. Bruckstein,et al. On Designing Moiré Patterns , 2002 .
[4] Ja-Chen Lin,et al. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..
[5] Minvydas Ragulskis,et al. Applicability of time-average moiré techniques for chaotic oscillations. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Alfred M. Bruckstein,et al. A Variational Approach to Moir E Pattern Synthesis , 2011 .
[7] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[8] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[9] Ching-Nung Yang,et al. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality , 2007, Int. J. Pattern Recognit. Artif. Intell..
[10] Stelvio Cimato,et al. Colored visual cryptography without color darkening , 2004, Theor. Comput. Sci..
[11] Jen-Bang Feng,et al. Visual secret sharing for multiple secrets , 2008, Pattern Recognit..
[12] Robert Goutte,et al. Digital deconvolution of degraded images by a space-invariant motion blur , 1980 .
[13] Alfred M. Bruckstein,et al. Designing Moiré Patterns , 2001, EMMCVPR.
[14] Ching-Nung Yang,et al. Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast , 2007 .
[15] Zenonas Navickas,et al. Hash function construction based on time average moiré , 2007 .
[16] P. Ifju,et al. High Sensitivity Moiré: Experimental Analysis for Mechanics and Materials , 1995 .
[17] Ramón Rodríguez-Vera,et al. Image encryption based on moiré pattern performed by computational algorithms , 2004 .
[18] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[19] Fulong Dai,et al. Geometric micron-moiré , 1999 .
[20] David Pearce MacAdam,et al. Digital Image Restoration by Constrained Deconvolution , 1970 .
[21] L. Milne‐Thomson. A Treatise on the Theory of Bessel Functions , 1945, Nature.
[22] Shang Kuan Chen. Friendly progressive visual secret sharing using generalized random grids , 2009 .
[23] Shyong Jian Shyu,et al. Image encryption by random grids , 2007, Pattern Recognit..
[24] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[25] Minvydas Ragulskis,et al. The structure of moiré grating lines and its influence to time-averaged fringes , 2009 .
[26] Krzysztof Patorski,et al. Handbook of the moiré fringe technique , 1993 .
[27] Tse-Shih Chen,et al. Special type of circular visual cryptography for multiple secret hiding , 2007 .
[28] Albert S. Kobayashi,et al. Handbook on experimental mechanics , 1987 .
[29] Tse-Shih Chen,et al. Using multi-ringed shadow image of visual cryptography to hide more secret messages , 2009 .
[30] Minvydas Ragulskis,et al. Improved algorithm for image encryption based on stochastic geometric moiré and its application , 2007 .
[31] Ran-Zan Wang,et al. Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..
[32] Yvo Desmedt,et al. Moiré cryptography , 2000, CCS.
[33] G. A. Watson. A treatise on the theory of Bessel functions , 1944 .
[34] Minvydas Ragulskis,et al. Image hiding based on time-averaging moiré , 2009 .
[35] Shyong Jian Shyu,et al. Efficient visual secret sharing scheme for color images , 2006, Pattern Recognit..