18
Views
19
CrossRef citations to date
0
Altmetric
Research Articles

Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images

Pages 90-101 | Published online: 18 Jul 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

H-K Tso. (2010) Sharing secret image using section encoding. The Imaging Science Journal 58:1, pages 32-36.
Read now

Articles from other publishers (18)

T E Jisha & Thomas Monoth. (2023) Contrast-enhanced visual cryptography schemes based on block pixel patterns. International Journal of Information Technology 15:5, pages 2445-2455.
Crossref
Hangying Huang, Zhengxin Fu & Bin Yu. (2021) Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding. Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding.
Bin Yan, Yong Xiang & Guang HuaBin Yan, Yong Xiang & Guang Hua. 2020. Improving Image Quality in Visual Cryptography. Improving Image Quality in Visual Cryptography 97 116 .
Bin Yan, Yong Xiang & Guang HuaBin Yan, Yong Xiang & Guang Hua. 2020. Improving Image Quality in Visual Cryptography. Improving Image Quality in Visual Cryptography 75 95 .
Bin Yan, Yong Xiang & Guang HuaBin Yan, Yong Xiang & Guang Hua. 2020. Improving Image Quality in Visual Cryptography. Improving Image Quality in Visual Cryptography 1 14 .
Bin Yan, Yong Xiang & Guang Hua. (2019) Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach. IEEE Transactions on Image Processing 28:2, pages 896-911.
Crossref
Her Chang Chao & Tzuo Yau Fan. (2017) Generating random grid-based visual secret sharing with multi-level encoding. Signal Processing: Image Communication 57, pages 60-67.
Crossref
Tzung-Her Chen, Yao-Sheng Lee & Chih-Hung Lin. (2016) On the difficulty of aligning VSS random grids. Signal Processing: Image Communication 44, pages 101-107.
Crossref
Wen Wang, Feng Liu, Weiqi Yan, Gang Shen & Teng Guo. 2016. Digital-Forensics and Watermarking. Digital-Forensics and Watermarking 418 432 .
Neha Sharma, Ajay Goyal & Anil Suryavanshi. (2014) Improved NVSS scheme for diverse image media. Improved NVSS scheme for diverse image media.
Young-Chang Hou, Shih-Chieh Wei & Chia-Yin Lin. (2014) Random-Grid-Based Visual Cryptography Schemes. IEEE Transactions on Circuits and Systems for Video Technology 24:5, pages 733-744.
Crossref
Young-Chang Hou, Zen-Yu Quan, Chih-Fong Tsai & A-Yu Tseng. (2013) Block-based progressive visual secret sharing. Information Sciences 233, pages 290-304.
Crossref
P. V. Jithi & A. T. Nair. (2013) Progressive visual cryptography with watermarking for meaningful shares. Progressive visual cryptography with watermarking for meaningful shares.
Young-Chang Hou & Zen-Yu Quan. (2011) Progressive Visual Cryptography With Unexpanded Shares. IEEE Transactions on Circuits and Systems for Video Technology 21:11, pages 1760-1764.
Crossref
Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu & Chwei-Shyong Tsai. (2011) A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32:3, pages 118-134.
Crossref
Hao-Kuan Tso & Der-Chyuan Lou. (2009) Sharing Secret Image Based on Random Grids. Sharing Secret Image Based on Random Grids.
Chin-Feng Lee, Chin-Chen Chang & Tien-Chung Liu. (2009) A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement.
Shu-Fen Tu & Ching-Sheng Hsu. (2009) Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme. Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.