共 50 条
- [31] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
- [32] A TTP watermarking protocol based on visual cryptography [J]. Multimedia Tools and Applications, 2022, 81 : 41079 - 41101
- [33] A TTP watermarking protocol based on visual cryptography [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 41079 - 41101
- [34] A Novel Visual Cryptography Scheme [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
- [36] On the randomness of visual cryptography scheme [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
- [37] Nested visual cryptography scheme [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03) : 459 - 463
- [38] A verifiable visual cryptography scheme [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
- [39] Color visual cryptography scheme [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2006, 18 (11): : 1770 - 1775
- [40] A Verifiable Visual Cryptography Scheme [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911