-
1
-
-
85114022463
-
Visual cryptography for general access structures
-
TR96-012, via WWW using
-
G. Ateniese, C. Blundo, A. DeSantis, and D. R. Stinson, "Visual Cryptography for General Access Structures," Electronic Colloquium on Computational Complexity, TR96-012, 1996, via WWW using http://www.eccc.unitrier.de/eccc.
-
(1996)
Electronic Colloquium on Computational Complexity
-
-
Ateniese, G.1
Blundo, C.2
DeSantis, A.3
Stinson, D.R.4
-
2
-
-
0030384775
-
Techniques for data hiding
-
Nos
-
W. Bender, D. Gruhl, N. Morimoto, and A. Liu, "Techniques for Data Hiding," IBM System Journal, Vol. 35, Nos. 3&4, 1996, pp. 313-336.
-
(1996)
IBM System Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Liu, A.4
-
3
-
-
0032187555
-
A virtual image cryptosystem based upon vector quantization
-
T. S. Chen, C. C. Chang, and M. S. Hwang, "A Virtual Image Cryptosystem Based Upon Vector Quantization," IEEE Transactions on Image Processing, Vol. 7, No. 10, 1998, pp. 1485-1488.
-
(1998)
IEEE Transactions on Image Processing
, vol.7
, Issue.10
, pp. 1485-1488
-
-
Chen, T.S.1
Chang, C.C.2
Hwang, M.S.3
-
4
-
-
84955572416
-
New results on visual cryptography
-
Springer-Verlag
-
S. Drostle, "New Results on Visual Cryptography," Advances in Cryptology: Eurocrypt' 96, Lecture Notes in Computer Science, No. 1109, Springer-Verlag, 1996, pp. 401-415.
-
(1996)
Advances in Cryptology: Eurocrypt' 96, Lecture Notes in Computer Science
, Issue.1109
, pp. 401-415
-
-
Drostle, S.1
-
5
-
-
84888416808
-
-
Phd. dissertation of the Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
-
R. J. Hwang and C. C. Chang, "Some Secret Sharing Schemes and Their Applications," Phd. dissertation of the Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan, 1998.
-
(1998)
Some Secret Sharing Schemes and Their Applications
-
-
Hwang, R.J.1
Chang, C.C.2
-
6
-
-
84926193517
-
Visual cryptography
-
Springer-Verlag, Berlin
-
N. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology: Eurocrypt'94, Springer-Verlag, Berlin, 1995, pp. 1-12.
-
(1995)
Advances in Cryptology: Eurocrypt'94
, pp. 1-12
-
-
Naor, N.1
Shamir, A.2
-
7
-
-
84958648410
-
Visual authentication and identification
-
M. Naor and B. Pinks, "Visual Authentication and Identification," CRYPW97, pp.322-336, available at http://theory.lcs.mit.edu/~tcryptol.
-
CRYPW97
, pp. 322-336
-
-
Naor, M.1
Pinks, B.2
-
8
-
-
0030409662
-
A method for signature casting on digital images
-
I. Pitas, "A Method for Signature Casting on Digital Images," IEEE Int. Conf. on Image Processing, Vol. 3, 1996, pp. 215-318.
-
(1996)
IEEE Int. Conf. On Image Processing
, vol.3
, pp. 215-318
-
-
Pitas, I.1
-
9
-
-
0242582715
-
Efficient colour visual encryption for shared colors of Benetton
-
V. Rijmen and B. Preneel, "Efficient Colour Visual Encryption for Shared Colors of Benetton," presented at Eurocrypto'96, Rump Session, available at http://www.iacr.org/conferences/ec96/rump/preneeI.ps.
-
Eurocrypto'96, Rump Session
-
-
Rijmen, V.1
Preneel, B.2
-
11
-
-
84997769409
-
A digital watermark
-
R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A Digital Watermark," IEEE Int. Conf. on Image Processing, Vol. 2, 1994, pp. 86-90.
-
(1994)
IEEE Int. Conf. On Image Processing
, vol.2
, pp. 86-90
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
12
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia Data-Embedding and Watermarking Technologies," Proceedings of IEEE, Vol. 86, No. 6, 1998, pp. 1064-1087.
-
(1998)
Proceedings of IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
|