A verifiable visual cryptography scheme

被引:0
|
作者
Han, Yan-Yan [1 ]
Wang, Su-Ying [2 ]
Hu, Yu-Pu [1 ]
He, Wen-Cai [3 ]
机构
[1] Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
[2] Department of Scientific Research, Air force Command College, Beijing 100089, China
[3] Department of Scientific Research, Beijing Electronic Science and Technology Institute, Beijing 100070, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
页码:86 / 89
相关论文
共 50 条
  • [1] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [2] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [3] A Verifiable Visual Cryptography Scheme Based on XOR Algorithm
    Han, Yanyan
    Dong, Haocong
    He, Wencai
    Liu, Juan
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 673 - 677
  • [4] Verifiable Visual Cryptography
    Hsu, Shuo-Fang
    Chang, Yu-Jie
    Wang, Ran-Zan
    Lee, Yeuan-Kuen
    Huang, Shih-Yu
    [J]. 2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 464 - 467
  • [5] VPVC: verifiable progressive visual cryptography
    Shivendra Shivani
    Suneeta Agarwal
    [J]. Pattern Analysis and Applications, 2018, 21 : 139 - 166
  • [6] VPVC: verifiable progressive visual cryptography
    Shivani, Shivendra
    Agarwal, Suneeta
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2018, 21 (01) : 139 - 166
  • [7] VMVC: Verifiable multi-tone visual cryptography
    Shivani, Shivendra
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 5169 - 5188
  • [8] VMVC: Verifiable multi-tone visual cryptography
    Shivendra Shivani
    [J]. Multimedia Tools and Applications, 2018, 77 : 5169 - 5188
  • [9] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [10] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675