-
1
-
-
84926193517
-
Visual cryptography
-
Springer, Berlin
-
Naor M., and Shamir A. Visual cryptography. Cryptology-Eurocrypt '94, Lecture Notes in Computer Science vol. 950 (1995), Springer, Berlin 1-12
-
(1995)
Cryptology-Eurocrypt '94, Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
3
-
-
0442280816
-
New visual secret sharing schemes using probabilistic method
-
Yang C.N. New visual secret sharing schemes using probabilistic method. Pattern Recognition Lett. 25 4 (2004) 481-494
-
(2004)
Pattern Recognition Lett.
, vol.25
, Issue.4
, pp. 481-494
-
-
Yang, C.N.1
-
5
-
-
0037233509
-
Visual cryptography by dithering techniques
-
Lin C.C., and Tsai W.H. Visual cryptography by dithering techniques. Pattern Recognition Lett. 24 (2003) 349-358
-
(2003)
Pattern Recognition Lett.
, vol.24
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
6
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
Lukac R., and Plataniotis K.N. Bit-level based secret sharing for image encryption. Pattern Recognition 38 5 (2005) 767-772
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
7
-
-
0037411307
-
Visual cryptography for color images
-
Hou Y.C. Visual cryptography for color images. Pattern Recognition 36 (2003) 1619-1629
-
(2003)
Pattern Recognition
, vol.36
, pp. 1619-1629
-
-
Hou, Y.C.1
-
8
-
-
0036794537
-
Secret image sharing
-
Thien C.C., and Lin J.C. Secret image sharing. Comput. Graphics 26 5 (2002) 765-770
-
(2002)
Comput. Graphics
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.C.1
Lin, J.C.2
-
9
-
-
0347946754
-
An image-sharing method with user-friendly shadow images
-
Thien C.C., and Lin J.C. An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13 12 (2003) 1161-1169
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.12
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
10
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Wu Y.S., Thien C.C., and Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 (2004) 1377-1385
-
(2004)
Pattern Recognition
, vol.37
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, J.C.3
-
11
-
-
14744284326
-
A new multi-secret images sharing scheme using Lagrange's interpolation
-
Feng J.B., Wu H.C., Tsai C.S., and Chu Y.P. A new multi-secret images sharing scheme using Lagrange's interpolation. J. Syst. Software 76 (2005) 327-339
-
(2005)
J. Syst. Software
, vol.76
, pp. 327-339
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
Chu, Y.P.4
-
12
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. J. Syst. Software 73 (2004) 405-414
-
(2004)
J. Syst. Software
, vol.73
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
13
-
-
25144517338
-
Fault-tolerant and progressive transmission of images
-
Chen S.K., and Lin J.C. Fault-tolerant and progressive transmission of images. Pattern Recognition 38 (2005) 2466-2471
-
(2005)
Pattern Recognition
, vol.38
, pp. 2466-2471
-
-
Chen, S.K.1
Lin, J.C.2
-
14
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 1979 22 11 (1979) 612-613
-
(1979)
Commun. ACM 1979
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0348108146
-
Lossless compression and information hiding in images
-
Maniccam S.S., and Bourbakis N.G. Lossless compression and information hiding in images. Pattern Recognition 37 3 (2004) 475-486
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 475-486
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
-
16
-
-
33750996440
-
An image-hiding method with high hiding capacity based on best-block matching and k-means clustering
-
Wang R.Z., and Tsai Y.D. An image-hiding method with high hiding capacity based on best-block matching and k-means clustering. Pattern Recognition 40 2 (2007) 398-409
-
(2007)
Pattern Recognition
, vol.40
, Issue.2
, pp. 398-409
-
-
Wang, R.Z.1
Tsai, Y.D.2
-
17
-
-
33644969019
-
A novel image-hiding scheme based on block difference
-
Li S.L., Leung K.C., Cheng L.M., and Chan C.K. A novel image-hiding scheme based on block difference. Pattern Recognition 39 6 (2006) 1168-1176
-
(2006)
Pattern Recognition
, vol.39
, Issue.6
, pp. 1168-1176
-
-
Li, S.L.1
Leung, K.C.2
Cheng, L.M.3
Chan, C.K.4
-
18
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164 (2005) 99-116
-
(2005)
Appl. Math. Comput.
, vol.164
, pp. 99-116
-
-
Wang, S.J.1
-
19
-
-
0035372202
-
Lossless image compression and encryption using SCAN
-
Maniccam S.S., and Bourbakis N.G. Lossless image compression and encryption using SCAN. Pattern Recognition 34 6 (2001) 1229-1245
-
(2001)
Pattern Recognition
, vol.34
, Issue.6
, pp. 1229-1245
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
|