4.5 Article

A novel two-in-one image secret sharing scheme based on perfect black visual cryptography

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Sharing more information in gray visual cryptography scheme

Peng Li et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2013)

Article Computer Science, Theory & Methods

Embedded Extended Visual Cryptography Schemes

Feng Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Artificial Intelligence

Image secret sharing method with two-decoding-options: Loss less recovery and previewing capability

Ching-Nung Yang et al.

IMAGE AND VISION COMPUTING (2010)

Article Computer Science, Information Systems

Colour visual cryptography schemes

F. Liu et al.

IET Information Security (2008)

Article Computer Science, Artificial Intelligence

Two secret sharing schemes based on Boolean operations

Daoshun Wang et al.

PATTERN RECOGNITION (2007)

Article Computer Science, Software Engineering

Improvements of image sharing with steganography and authentication

Ching-Nung Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2007)

Article Engineering, Electrical & Electronic

Scalable secret image sharing

Ran-Zan Wang et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2007)