Cryptography Reference
In-Depth Information
[10] P. C. Chang, C. S. Yu, and T. H. Lee, Hybrid LMS-MMS Inverse Halfton-
ing Technique, IEEE Trans. Image Process., Vol. 10, No. 1, pp. 95{103,
2001.
[11] K. L. Chung and S. T. Wu, Inverse Halftoning Algorithm Using Edge-
Based Lookup Table Approach, IEEE Trans. Image Process., Vol. 14, No.
10, pp. 1583{1589, 2005.
[12] J. Canny, A Computational Approach to Edge Detection, IEEE Trans.
Pattern Analysis and Machine Intelligence., Vol. 8, No. 6, pp. 679{698,
1986.
[13] J. B. Feng, I. C. Lin, and Y. P. Chu, Halftone Image Resampling by
Interpolation and Error-Diffusion, Proceedings of the 2nd International
Conference on Ubiquitous Information Management and Communication,
pp. 409{413, 2008.
[14] G. Horng, T. Chen, and D. Tasi, Cheating in Visual Cryptography, De-
signs, Codes and Cryptography, Vol. 38, pp. 219{236, 2006.
[15] C.-C. Lin and W.-H. Tsai, Secret Image Sharing with Steganography
and Authentication, Journal of Systems and Software, Vol. 73, No. 3, pp.
405{414, 2004.
[16] M. Mese and P. P. Vaidyanathan, Look up Table (LUT) Scheme for
Inverse Halftoning, IEEE Trans. Image Process., Vol. 10, No. 10, pp.
1566{1578, 2001.
[17] M. Naor and A. Shamir, Visual Cryptography, Advances in Cryptology
- Eurocrypt' 94, Lecture Notes in Computer Science, Vol. 950, pp. 1{12,
1995.
[18] R. D. Prisco and A. D. Santis, Cheating Immune (2, n)-Threshold Visual
Secret Sharing, Lecture Notes in Computer Science, Vol. 4116, pp. 216{
228, 2006.
[19] L. G. Roberts, Machine Perception of Three-Dimensional Solids, Optical
and Electro-Optical Information Processing, pp. 159{197, 1965.
[20] A. Shamir, How to Share a Secret, Communications of ACM, Vol. 22,
no. 11, pp. 612{613, 1979.
[21] S. J. Shyu, Ecient Visual Secret Sharing Scheme for Color Images, Pat-
tern Recognition Letters, Vol. 39, No. 5, pp. 866{880, May 2006.
[22] A. Shiozaki, Digital Half-Toning by Error Diffusion with Perturbation,
Electronics Letters, Vol. 32, No. 18, pp. 1655{1656, 1996.
[23] C.-C. Thien and J.-C. Lin, Secret Image Sharing, Computers and Graph-
ics, Vol. 26, No. 5, pp. 765{770, 2002.
 
Search WWH ::




Custom Search