1 |
F. Liu, C.K. Wu and X.J. Lin, "Some extensions on threshold visual cryptography schemes," The Computer Journal, vol. 53, pp. 107-119, 2010.
DOI
|
2 |
M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology- EUROCRYPT'94, pp. 1-12, 1994.
|
3 |
G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, pp. 143-161, 2001.
DOI
|
4 |
C.N. Yang and T.S. Chen, "Extended visual secret sharing schemes: improving the shadow image quality," International Journal of Pattern Recognition and Artificial Intelligence, vol. 21, pp. 879-898, 2007.
DOI
|
5 |
P. Tuyls, H.D.L. Hollmann, J.H. Van Lint and L. Tolhuizen, "XOR-based visual cryptography schemes," Designs, Codes and Cryptography, vol. 37, no. 1, pp. 169-186, 2005.
DOI
|
6 |
M. Nakajima and Y. Yamaguchi, "Enhancing registration tolerance of extended visual cryptography for natural images," Journal of Electronic Imaging, vol. 13, pp. 654-662, 2004.
DOI
|
7 |
D.Q. Viet and K. Kurosawa, "Almost ideal contrast visual cryptography with reversing," Cryptology- CT-RSA, pp. 353-365, 2004.
|
8 |
S. Cimato, A. De Santis, A.L. Ferrara and B. Masucci, "Ideal contrast visual cryptography schemes with reversing," Information Processing Letters, vol. 93, pp. 199-206, 2005.
DOI
|
9 |
C.N. Yang, C.C. Wang and T.S. Chen, "Visual cryptography schemes with reversing," The Computer Journal, vol. 51, pp. 710-722, 2008.
DOI
|
10 |
H. Gou and M. Wu, "Improving embedding payload in binary images with super-pixels," in Proc. of IEEE International Conference on Image Processing, vol.3, pp.III-277-III-280, 2007.
|
11 |
I.S. Lee and W.H. Tsai, "A dynamic-programming approach to data hiding in binary image using block pattern coding with distortion minimization," IEICE Transaction on Information and Systems, vol. E90-D, no. 8, pp. 1142-1150, 2007.
DOI
|
12 |
Y.A. Ho, Y.K. Chan, H.C. Wu and Y.P. Chu, "High-capacity reversible data hiding in binary images using pattern substitution," Computer Standards & Interfaces, vol. 31, pp. 787-794, 2009.
DOI
|
13 |
C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism," Pattern Recognition, vol. 38, pp. 1993-2006, 2005.
DOI
|
14 |
M.S. Fu and O.C. Au, "Steganography in halftone images: conjugate error diffusion," Signal Processing, vol. 83, pp. 2171-2178, 2003.
DOI
|
15 |
M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. on Multimedia, vol. 6, pp. 528-538, 2004.
DOI
|
16 |
P. Sherry and A. Savakis, "Improved techniques for watermarking halftone images," Acoustics, Speech, and Signal Processing, vol. 5, pp. 1005-1008, 2004.
|
17 |
M. Wu, J. Fridrich, M. Goljan and H. Gou, "Handling uneven embedding capacity in binary images: a revisit," SPIE Conference on Security, Watermarking and Steganography, vol. 5681, pp. 194-205, 2005.
|
18 |
C.C. Lin and W. H. Tsai, "Secret multimedia information sharing with data hiding capacity by simple logic operations," in Proc. of 5th World Multi-conference on Systemics, Cybernetics, and Informatics, Vol. I: Information Systems Development, pp. 50-55, 2001.
|
19 |
M.S. Fu and O.C. Au, "Data hiding in halftone image by stochastic error diffusion," IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1965-1968, 2001.
|