-
1
-
-
84926193517
-
Visual cryptography
-
Eurocrypt'94
-
M. Naor, A. Shamir, Visual cryptography, in: Eurocrypt'94, Lecture Notes in Computer Science, vol. 950, 1994, pp. 1-12.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
2
-
-
0037233509
-
Visual cryptography for gray-level images by dithering techniques
-
Lin C.C., and Tsai W.H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24 (2003) 349-358
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
3
-
-
0037411307
-
Visual cryptography for color images
-
Hou J.C. Visual cryptography for color images. Pattern Recognition 36 (2003) 1619-1629
-
(2003)
Pattern Recognition
, vol.36
, pp. 1619-1629
-
-
Hou, J.C.1
-
6
-
-
0000049121
-
Constructions and properties of k out of n visual secret sharing scheme
-
Verheul E.R., and Van Tilborg H.C.A. Constructions and properties of k out of n visual secret sharing scheme. Designs, Codes and Cryptography 1 (1997) 179-196
-
(1997)
Designs, Codes and Cryptography
, vol.1
, pp. 179-196
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
-
10
-
-
33244471538
-
Efficient visual secret sharing scheme for color images
-
Shyu S.J. Efficient visual secret sharing scheme for color images. Pattern Recognition 39 (2006) 866-880
-
(2006)
Pattern Recognition
, vol.39
, pp. 866-880
-
-
Shyu, S.J.1
-
11
-
-
45549107563
-
Colored visual cryptography scheme based on additive color mixing
-
Yang C.N., and Chen T.S. Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41 (2008) 3114-3129
-
(2008)
Pattern Recognition
, vol.41
, pp. 3114-3129
-
-
Yang, C.N.1
Chen, T.S.2
-
14
-
-
0442280816
-
New visual secret sharing schemes using probabilistic method
-
Yang C.N. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25 (2004) 481-494
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 481-494
-
-
Yang, C.N.1
-
18
-
-
32844469722
-
Secret image sharing with smaller shadows
-
Wang R.Z., and Su C.H. Secret image sharing with smaller shadows. Pattern Recognition Letters 27 (2006) 551-555
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 551-555
-
-
Wang, R.Z.1
Su, C.H.2
-
20
-
-
4944220178
-
Enhancing registration tolerance of extended visual cryptography for natural images
-
Nakajima M., and Yamaguchi Y. Enhancing registration tolerance of extended visual cryptography for natural images. Journal of Electronic Imaging 13 (2004) 654-662
-
(2004)
Journal of Electronic Imaging
, vol.13
, pp. 654-662
-
-
Nakajima, M.1
Yamaguchi, Y.2
-
22
-
-
34547804877
-
Sharing multiple secrets in visual cryptography
-
Shyu S.J., Huang S.Y., Lee Y.K., Wang R.Z., and Chen K. Sharing multiple secrets in visual cryptography. Pattern Recognition 40 (2007) 3633-3651
-
(2007)
Pattern Recognition
, vol.40
, pp. 3633-3651
-
-
Shyu, S.J.1
Huang, S.Y.2
Lee, Y.K.3
Wang, R.Z.4
Chen, K.5
-
23
-
-
49449118313
-
Visual secret sharing for multiple secrets
-
Feng J.B., Wu H.C., Tsai C.S., Chang Y.F., and Chu Y.P. Visual secret sharing for multiple secrets. Pattern Recognition 41 (2008) 3572-3581
-
(2008)
Pattern Recognition
, vol.41
, pp. 3572-3581
-
-
Feng, J.B.1
Wu, H.C.2
Tsai, C.S.3
Chang, Y.F.4
Chu, Y.P.5
-
25
-
-
34147183148
-
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
-
Tsai D.S., Chen T.H., and Horng G. A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40 (2007) 2356-2366
-
(2007)
Pattern Recognition
, vol.40
, pp. 2356-2366
-
-
Tsai, D.S.1
Chen, T.H.2
Horng, G.3
-
28
-
-
13644263677
-
Bit-level based secret sharing for image encryption
-
Lukac R., and Plataniotis K.N. Bit-level based secret sharing for image encryption. Pattern Recognition 38 (2005) 767-772
-
(2005)
Pattern Recognition
, vol.38
, pp. 767-772
-
-
Lukac, R.1
Plataniotis, K.N.2
-
29
-
-
24944521921
-
A cost-effective encryption scheme for color images
-
Lukac R., and Plataniotis K.N. A cost-effective encryption scheme for color images. Real-Time Imaging 11 (2005) 454-464
-
(2005)
Real-Time Imaging
, vol.11
, pp. 454-464
-
-
Lukac, R.1
Plataniotis, K.N.2
-
32
-
-
45549098627
-
Sharing secrets in stego images with authentication
-
Chang C.C., Hsieh Y.P., and Lin C.H. Sharing secrets in stego images with authentication. Pattern Recognition 41 (2008) 3130-3137
-
(2008)
Pattern Recognition
, vol.41
, pp. 3130-3137
-
-
Chang, C.C.1
Hsieh, Y.P.2
Lin, C.H.3
-
33
-
-
34547689489
-
VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches
-
Lin S.J., and Lin J.C. VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40 (2007) 3652-3666
-
(2007)
Pattern Recognition
, vol.40
, pp. 3652-3666
-
-
Lin, S.J.1
Lin, J.C.2
-
34
-
-
46449106141
-
An image secret sharing scheme with the capability of previewing the secret image
-
Beijing, China
-
C.N. Yang, T.S. Chen, An image secret sharing scheme with the capability of previewing the secret image, in: IEEE ICME International Conference on Multimedia & Expo ICME'07, Beijing, China, 2007, pp. 1535-1538.
-
(2007)
IEEE ICME International Conference on Multimedia & Expo ICME'07
, pp. 1535-1538
-
-
Yang, C.N.1
Chen, T.S.2
-
35
-
-
27144456761
-
Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics
-
Lukac R., and Platanniotis K. Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics. IEEE Transactions on Consumer Electronics 51 (2005) 908-916
-
(2005)
IEEE Transactions on Consumer Electronics
, vol.51
, pp. 908-916
-
-
Lukac, R.1
Platanniotis, K.2
-
37
-
-
0036605019
-
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
-
Chang C.C., and Chuang J.C. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23 (2002) 931-941
-
(2002)
Pattern Recognition Letters
, vol.23
, pp. 931-941
-
-
Chang, C.C.1
Chuang, J.C.2
-
38
-
-
35048851010
-
Visual cryptography for digital watermarking in still images
-
Proceedings of the Advances in Multimedia Information Processing
-
G.C. Tsai, L.W. Chang, G.C. Tai, L.W. Chang, Visual cryptography for digital watermarking in still images, in: Proceedings of the Advances in Multimedia Information Processing, Lecture Notes in Computer Science, vol. 3332, 2004, pp. 50-57.
-
(2004)
Lecture Notes in Computer Science
, vol.3332
, pp. 50-57
-
-
Tsai, G.C.1
Chang, L.W.2
Tai, G.C.3
Chang, L.W.4
-
39
-
-
10444226634
-
A new repeating color watermarking scheme based on human visual model
-
Tai S.C., and Chang C.C. A new repeating color watermarking scheme based on human visual model. Eurasip Journal of Applied Signal Processing (2004) 1965-1972
-
(2004)
Eurasip Journal of Applied Signal Processing
, pp. 1965-1972
-
-
Tai, S.C.1
Chang, C.C.2
-
40
-
-
0042286862
-
Securing information display by use of visual cryptography
-
Yamamoto H., Hayasaki Y., and Nishida N. Securing information display by use of visual cryptography. Optics Letters 28 (2003) 1564-1566
-
(2003)
Optics Letters
, vol.28
, pp. 1564-1566
-
-
Yamamoto, H.1
Hayasaki, Y.2
Nishida, N.3
-
41
-
-
35048826285
-
Visual crypto displays enabling secure communications
-
Proceedings of the First International Conference on Security in Pervasive Computing
-
P. Tuyls, T. Kevenaar, G. J. Schrije, A.A.M. Staring, M. van Dijk, Visual crypto displays enabling secure communications, in: Proceedings of the First International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science, vol. 2802, 2003, pp. 271-284.
-
(2003)
Lecture Notes in Computer Science
, vol.2802
, pp. 271-284
-
-
Tuyls, P.1
Kevenaar, T.2
Schrije, G.J.3
Staring, A.A.M.4
van Dijk, M.5
-
42
-
-
32344448158
-
Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme
-
Yang C.N., Chen T.S., and Ching M.H. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integrated Computer-Aided Engineering 13 (2006) 189-199
-
(2006)
Integrated Computer-Aided Engineering
, vol.13
, pp. 189-199
-
-
Yang, C.N.1
Chen, T.S.2
Ching, M.H.3
-
43
-
-
64549121614
-
-
G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structures, in: Proceedings of the Electronic Colloquium on Computational Complexity, TR96-012, 1996.
-
G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structures, in: Proceedings of the Electronic Colloquium on Computational Complexity, TR96-012, 1996.
-
-
-
-
44
-
-
84955558118
-
Limiting the visible space visual secret sharing schemes and their application to human identification
-
Asiacrypt'96
-
K. Kobara, H. Imai, Limiting the visible space visual secret sharing schemes and their application to human identification, in: Asiacrypt'96, Lecture Notes in Computer Science, vol. 1163, 1996, pp. 185-195.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 185-195
-
-
Kobara, K.1
Imai, H.2
-
45
-
-
27544489075
-
Seeing-Is-Believing: Using camera phones for human-verifiable authentication
-
J.M. McCune, A. Perrig, M.K. Reiter, Seeing-Is-Believing: using camera phones for human-verifiable authentication, in: IEEE Symposium on Security and Privacy, 2005, pp. 110-124.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
46
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Eurocrypt'03
-
L. von Ahn, M. Blum, N. Hopper, J. Langford, CAPTCHA: using hard AI problems for security, in: Eurocrypt'03, Lecture Notes in Computer Science, vol. 2656, 2003, pp. 294-311.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
47
-
-
46049088141
-
Security analysis on authentication of images using recursive visual cryptography
-
Yang C.N., and Chen T.S. Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32 (2008) 131-136
-
(2008)
Cryptologia
, vol.32
, pp. 131-136
-
-
Yang, C.N.1
Chen, T.S.2
|