Cryptography Reference
In-Depth Information
[10] M.S. Fu and O.C. Au. A novel method to embed watermark in different
halftone images: Data hiding by conjugate error diffusion (DHCED). In
Intl Conference on Acoustics, Speech, and Signal Processing, volume III,
pages 529{532, 2003.
[11] R.C. Gonzalez and R.E. Woods. Digital Image Processing, Third Edition.
Pearson Education International, 2010.
[12] Y.-C. Hou. Visual cryptography for color images. Pattern Recognition,
36(7):1619{1629, 2003.
[13] T. Ishihara and H. Koga. A visual secret sharing scheme for color images
based on meanvalue-color mixing. IEICE Trans. on Fundamentals, E86-
A(1):194{197, 2003.
[14] R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryp-
tography. IEICE Trans. on Fundamentals, E82-A(10):2127{2177, 1999.
[15] M. Iwamoto and H. Yamamoto. The optimal n-out-of-n visual secret
sharing scheme for gray-scale images.
IEICE Trans. on Fundamentals,
E85-A(10):2238{2247, 2002.
[16] J.F. Jarvis, C.N. Judice, and W.H. Ninke. A survey of techniques for
the display of continuous tone pictures on bilevel displays.
Computer
Graphics and Image Processing, 5(1):13{40, 1976.
[17] O. Kafri and E. Keren. Image encryption by multiple random grids.
Optics Letters, 12(6):377{379, 1987.
[18] H.R. Kang. Digital Color Halftoning. SPIE Optical Engineering Press,
IEEE Press, 1999.
[19] I. Kang, G.R. Arce, and H.-K. Lee. Color extended visual cryptography
using error diffusion. In Intl. Conference on Acoustics, Speech and Signal
Processing, pages 1473{1476, 2009.
[20] H.J. Kim and Y. Choi. A new visual cryptography using natural images.
In Intl. Symposium on Circuits and Systems, pages 5537{5540, 2005.
[21] K.T. Knox. Digital Watermarking Using Stochastic Screen Patterns. US
Patent No. 5,734,752, 1998.
[22] H. Koga and H. Yamamoto. Proposal of a lattice-based visual secret
sharing scheme for color and gray-scale images. IEICE Trans. on Fun-
damentals, E81-A(6):1262{1269, 1998.
[23] S.-S. Lee, J.-C. Na, S.-W. Sohn, C. Park, D.-H. Seo, and S.-J. Kim. Visual
cryptography based on an interferometric encryption technique.
ETRI
Journal, 24(5):373{380, 2002.
 
Search WWH ::




Custom Search