Color visual cryptography scheme

被引:0
|
作者
Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China [1 ]
机构
来源
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao | 2006年 / 11卷 / 1770-1775期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1770 / 1775
相关论文
共 50 条
  • [31] Secure Image Transmission using Visual Cryptography Scheme without Changing the Color of the Image
    Johny, Shiji
    Antony, Anil
    2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 42 - 44
  • [32] CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data
    Sherine, Anli
    Peter, Geno
    Stonier, Albert Alexander
    Praghash, K.
    Ganji, Vivekananda
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] HALFTONE VISUAL CRYPTOGRAPHY WITH COLOR SHARES
    Liu, Yuanfeng
    Wang, Zhongmin
    2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), 2012, : 746 - 749
  • [34] Visual cryptography for JPEG color images
    Sudharsanan, S
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS V, 2004, 5601 : 171 - 178
  • [35] HALFTONE VISUAL CRYPTOGRAPHY FOR COLOR IMAGES
    Pahuja, Shivani
    Kasana, Singara Singh
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 281 - 285
  • [36] Research on Rotation Visual Cryptography Scheme
    Fu, Zhengxin
    Yu, Bin
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 533 - 536
  • [37] Visual Cryptography Scheme with Essential Participants
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    MATHEMATICS, 2020, 8 (05)
  • [38] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [39] Optimization of XOR Visual Cryptography Scheme
    Shi, Lin
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 297 - 301
  • [40] Cheating immune visual cryptography scheme
    Liu, F.
    Wu, C.
    Lin, X.
    IET INFORMATION SECURITY, 2011, 5 (01) : 51 - 59