default search action
Transactions on Data Hiding and Multimedia Security, Volume 9, 2014
- Yun Q. Shi, Feng Liu, WeiQi Yan:
Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography. Lecture Notes in Computer Science 8363, Springer 2014, ISBN 978-3-642-55045-4 - Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu:
ESSVCS: An Enriched Secret Sharing Visual Cryptography. 1-24 - Yasushi Yamaguchi:
Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images. 25-41 - Zhengxin Fu, Bin Yu:
Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares. 42-56 - Roman V. Yampolskiy, Jovan David Rebolledo Méndez, Musa Hindi:
Password Protected Visual Cryptography via Cellular Automaton Rule 30. 57-67 - Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
A Novel Perceptual Secret Sharing Scheme. 68-90 - Stelvio Cimato, James C. N. Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking. 91-109 - Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang:
Flexible Visual Cryptography Scheme and Its Application. 110-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.