Cryptography Reference
In-Depth Information
[10] A. Houmansadr and S. Ghaemmaghami. A novel video watermarking
method using visual cryptography. In Proc. IEEE Int. Conf. on Engi-
neering of Intelligent Systems, Islamabad, Pakistan, Apr. 2006.
[11] S. H. Kim and J. P. Allebach. Impact of HVS models on model-based
halftoning. IEEE Trans. Image Process., 11(3):258{269, Mar. 2002.
[12] D. L. Lau and G. R. Arce. Modern Digital Halftoning. Marcel Dekker,
Inc, 2001.
[13] D. L. Lau, G. R. Arce, and N. C. Gallagher. Green-noise digital halfton-
ing. Proceedings of the IEEE, 86(12):2424{2444, Dec. 1998.
[14] D. L. Lau, G. R. Arce, and N. C. Gallagher. Digital halftoning by means
of green-noise masks. J. Opt. Soc. Am. A-Optics Image Sci. and Vis.,
16(7):1575{1586, Jul. 1999.
[15] D. L. Lau, G. R. Arce, and N. C. Gallagher. Digital color halftoning with
generalized error diffusion and multi-channel green-noise masks.
IEEE
Trans. Image Processing, 9(5):923{935, May 2000.
[16] D. L. Lau, R. Ulichney, and G. R. Arce. Blue- and green-noise halftoning
models|a review of the spatial and spectral characteristics of halftone
textures. IEEE Signal Processing Magazine, 10(4):28{38, Jul. 2003.
[17] P. Li and J. P. Allebach. Tone-dependent error diffusion. IEEE Trans.
Image Process., 13(2):201{215, Feb. 2004.
[18] M. Naor and B. Pinkas. Visual authentication and identification.
Crypto97, LNCS, 1294:322{340, 1997.
[19] M. Naor and A. Shamir. Visual cryptography. Advances in Cryptography:
EUROCRYPT'94, LNCS, 950:1{12, 1995.
[20] R. A. Ulichney. Dithering with blue noise. In Proc. the IEEE, volume 76,
pages 56{79, Jan. 1988.
[21] N. D. Venkata and B. L. Evans. Adaptive threshold modulation for error
diffusion halftoning.
IEEE Trans. Image Process., 10(1):104{116, Jan.
2001.
[22] Z. Wang and G. R. Arce. Halftone visual cryptography through error
diffusion. In Proc. IEEE ICIP, Atlanta, GA, Oct. 2006.
[23] Z. Wang and G. R. Arce. Halftone visual cryptography via error diffusion.
IEEE Trans. Inf. Forensics Security, 4(3):383{396, Sep. 2009.
[24] C. W. Wu and G. Thompson. Digital watermarking and steganography
via overlays of halftone images. In Proc. SPIE, volume 5561, pages 152{
163, Oct. 2004.
 
Search WWH ::




Custom Search