-
1
-
-
0034899594
-
Extended capabilities for visual cryptography
-
G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Extended capabilities for visual cryptography, Theoret. Comput. Sci. 250 (2001) 143-161.
-
(2001)
Theoret. Comput. Sci
, vol.250
, pp. 143-161
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
0002015048
-
Visual cryptography for general access structures
-
G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, ECCC, Electronic Colloquium on Computational Complexity TR96-012 (1996), pp. 86-106.
-
(1996)
ECCC, Electronic Colloquium on Computational Complexity TR96-012
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
4
-
-
84957879665
-
Cerebral cryptography
-
Second Int. Workshop on Information Hiding
-
Y. Desmedt, S. Hou and J. Quisquater, Cerebral cryptography, Second Int. Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1525 (1998), pp. 62-72.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 62-72
-
-
Desmedt, Y.1
Hou, S.2
Quisquater, J.3
-
6
-
-
31244437258
-
Threshold visual cryptography schemes with specified levels of reconstructed pixels
-
P. A. Eisen and D. R. Stinson, Threshold visual cryptography schemes with specified levels of reconstructed pixels, Des. Codes Cryptogr. 25 (2002) 15-61.
-
(2002)
Des. Codes Cryptogr
, vol.25
, pp. 15-61
-
-
Eisen, P.A.1
Stinson, D.R.2
-
8
-
-
0037411307
-
Visual cryptography for color images
-
J. C. Hou, Visual cryptography for color images, Patt. Recogn. 36 (2003) 1619-1629.
-
(2003)
Patt. Recogn
, vol.36
, pp. 1619-1629
-
-
Hou, J.C.1
-
10
-
-
0037233509
-
Visual cryptography for gray-level images by dithering techniques
-
C. C. Lin and W. H. Tsai, Visual cryptography for gray-level images by dithering techniques, Patt. Recogn. Lett. 24 (2003) 349-358.
-
(2003)
Patt. Recogn. Lett
, vol.24
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
11
-
-
0141741345
-
Secret image sharing with capability of share data reduction
-
C. C. Lin and W. H. Tsai, Secret image sharing with capability of share data reduction, Opt. Engin. 42 (2005) 2340-2345.
-
(2005)
Opt. Engin
, vol.42
, pp. 2340-2345
-
-
Lin, C.C.1
Tsai, W.H.2
-
12
-
-
34547782101
-
Secret multimedia information sharing with data hiding capacity by simple logic operations
-
Orlando, Florida, USA
-
C. C. Lin and W. H. Tsai, Secret multimedia information sharing with data hiding capacity by simple logic operations, 7th Int. Conf. Information Systems, Analysis, and Synthesis, Orlando, Florida, USA 1 (2001) 50-55.
-
(2001)
7th Int. Conf. Information Systems, Analysis, and Synthesis
, vol.1
, pp. 50-55
-
-
Lin, C.C.1
Tsai, W.H.2
-
13
-
-
27144456761
-
Digital image indexing using secret sharing schemes: A unified framework for single-sensor consumer electronics
-
R. Lukac and K. Platanniotis, Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics, IEEE Trans. Consum. Electron. 51 (2005) 908-916.
-
(2005)
IEEE Trans. Consum. Electron
, vol.51
, pp. 908-916
-
-
Lukac, R.1
Platanniotis, K.2
-
14
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
R. Lukac and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Patt. Recogn. 38 (2005) 767-772.
-
(2005)
Patt. Recogn
, vol.38
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
15
-
-
24944521921
-
A cost-effective encryption scheme for color images
-
R. Lukac and K. N. Plataniotis, A cost-effective encryption scheme for color images, Real-Time Imag. 11 (2005) 454-464.
-
(2005)
Real-Time Imag
, vol.11
, pp. 454-464
-
-
Lukac, R.1
Plataniotis, K.N.2
-
16
-
-
24944453002
-
Image representation based secret sharing
-
R. Lukac and K. N. Plataniotis, Image representation based secret sharing, Commun. CCISA 11 (2005) 103-114.
-
(2005)
Commun. CCISA
, vol.11
, pp. 103-114
-
-
Lukac, R.1
Plataniotis, K.N.2
-
17
-
-
4944220178
-
Enhancing registration tolerance of extended visual cryptography for natural images
-
M. Nakajima and Y. Yamaguchi, Enhancing registration tolerance of extended visual cryptography for natural images, J. Electron. Imag.13 (2004) 654-662.
-
(2004)
J. Electron. Imag
, vol.13
, pp. 654-662
-
-
Nakajima, M.1
Yamaguchi, Y.2
-
18
-
-
84926193517
-
Visual cryptography, Advances in Cryptology-EUROCRYPT'94
-
M. Naor and A. Shamir, Visual cryptography, Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science, Vol. 950 (1995) 1-12.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
19
-
-
0347946754
-
An image-sharing method with user-friendly shadow images
-
C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst. Vid. Technol. 13 (2003) 1161-1169.
-
(2003)
IEEE Trans. Circuits Syst. Vid. Technol
, vol.13
, pp. 1161-1169
-
-
Thien, C.C.1
Lin, J.C.2
-
20
-
-
35048826285
-
-
P. Tuyls, T. Kevenaar, G. J. Schrije, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, Security in Pervasive Computing, Lecture Notes in Computer Science, 2802 (2003) 271-284.
-
P. Tuyls, T. Kevenaar, G. J. Schrije, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802 (2003) 271-284.
-
-
-
-
21
-
-
32844469722
-
Secret image sharing with smaller shadow images
-
R. Z. Wang and C. H. Su, Secret image sharing with smaller shadow images, Patt. Recogn. Lett.27 (2006) 551-555.
-
(2006)
Patt. Recogn. Lett
, vol.27
, pp. 551-555
-
-
Wang, R.Z.1
Su, C.H.2
-
22
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Trans. Fund.E83-A (2000) 1589-1598.
-
(2000)
IEICE Trans. Fund
, vol.E83-A
, pp. 1589-1598
-
-
Wang, C.C.1
Tai, S.C.2
Yu, C.S.3
-
23
-
-
0042286862
-
Securing information display by use of visual cryptography
-
H. Yamamoto, Y. Hayasaki and N. Nishida, Securing information display by use of visual cryptography, Opt. Lett. 28 (2003) 1564-1566.
-
(2003)
Opt. Lett
, vol.28
, pp. 1564-1566
-
-
Yamamoto, H.1
Hayasaki, Y.2
Nishida, N.3
-
24
-
-
32344448158
-
Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme
-
C. N. Yang, T. S. Chen and M. H. Ching, Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme, Integr. Comput.-Aided Engin. 13 (2006) 189-199.
-
(2006)
Integr. Comput.-Aided Engin
, vol.13
, pp. 189-199
-
-
Yang, C.N.1
Chen, T.S.2
Ching, M.H.3
|