X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (197) 197
Conference Proceeding (54) 54
Book Chapter (13) 13
Book / eBook (7) 7
Dissertation (4) 4
Web Resource (3) 3
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (63) 63
visual cryptography (60) 60
computer science (57) 57
engineering, electrical & electronic (57) 57
computer science, information systems (51) 51
steganography (38) 38
authentication (33) 33
secret sharing (30) 30
visual secret sharing (26) 26
computer science, software engineering (25) 25
secret image sharing (25) 25
image reconstruction (24) 24
data hiding (23) 23
shadows (23) 23
telecommunications (23) 23
computer science, theory & methods (21) 21
analysis (18) 18
visual (17) 17
algorithms (16) 16
computer science, artificial intelligence (15) 15
security (14) 14
computer science, hardware & architecture (13) 13
decoding (13) 13
encryption (13) 13
scheme (13) 13
data encryption (12) 12
hamming code (12) 12
image quality (12) 12
image secret sharing (12) 12
multimedia information systems (12) 12
pixels (12) 12
size (12) 12
verschlüsselung (12) 12
visualisierung (12) 12
image processing (11) 11
secret sharing schemes (11) 11
computer graphics (10) 10
computer security (10) 10
image processing and computer vision (10) 10
imaging science & photographic technology (10) 10
quality (10) 10
secret sharing scheme (10) 10
artificial intelligence (9) 9
computer communication networks (9) 9
embedding (9) 9
information science (9) 9
pattern recognition (9) 9
shadow image (9) 9
stacking (9) 9
watermarking (9) 9
codes (8) 8
lagrange interpolation (8) 8
polynomials (8) 8
protocols (8) 8
rekonstruktion (8) 8
schemes (8) 8
studies (8) 8
user interfaces and human computer interaction (8) 8
visualization (8) 8
construction (7) 7
design (7) 7
encoding (7) 7
methods (7) 7
privacy (7) 7
signal,image and speech processing (7) 7
software (7) 7
special purpose and application-based systems (7) 7
steganographie (7) 7
theoretische analyse (7) 7
visual secret sharing scheme (7) 7
ambtc (6) 6
computation (6) 6
computer programs (6) 6
computer science, general (6) 6
contrast (6) 6
engineering (6) 6
hamming codes (6) 6
image detection (6) 6
image processing systems (6) 6
lsb (6) 6
optics (6) 6
personal computing (6) 6
radiofrequency identification (6) 6
thresholds (6) 6
usage (6) 6
algorithm design and analysis (5) 5
balanced codes (5) 5
boolean operation (5) 5
cloud computing (5) 5
computer information security (5) 5
computers (5) 5
constructions (5) 5
data security (5) 5
data structures, cryptology and information theory (5) 5
electronics (5) 5
feature extraction (5) 5
information (5) 5
information hiding (5) 5
information systems applications (5) 5
kryptographie (5) 5
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2012, Digital imaging and computer vision, ISBN 9781439837214, Volume 4, xxxvi, 501
"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the... 
Image files | Data encryption (Computer science) | Image processing | Security measures | Computer file sharing
Book
IEEE Transactions on Circuits and Systems for Video Technology, ISSN 1051-8215, 02/2014, Volume 24, Issue 2, pp. 189 - 197
A (k,n) visual cryptographic scheme (VCS) encodes a secret image into n shadow images (printed on transparencies) distributed among n participants. When any k... 
visual secret sharing | Visualization | Stacking | Vectors | Decoding | Image secret sharing | Cryptography | secret sharing | Image reconstruction | visual cryptography | IMAGES | SECRET SHARING SCHEMES | ENGINEERING, ELECTRICAL & ELECTRONIC | Usage | Distribution (Probability theory) | Image processing | Mathematical optimization | Innovations | Imaging systems | Human | Shadows | Projectors | Circuits | Images | Visual
Journal Article
IEICE transactions on information and systems, ISSN 0916-8532, 2016, Volume E99.D, Issue 6, pp. 1531 - 1540
For detecting the image copies of a given original image generated by arbitrary rotation, the existing image copy detection methods can not simultaneously... 
arbitrary rotation | copy attacks | intensity orders | rotation invariant | image copy detection | Arbitrary Rotation | Image Copy Detection | Rotation Invariant | Copy Attacks | Intensity Orders | COMPUTER SCIENCE, SOFTWARE ENGINEERING | ROBUST | COMPUTER SCIENCE, INFORMATION SYSTEMS | FEATURES
Journal Article
IEEE Transactions on Circuits and Systems for Video Technology, ISSN 1051-8215, 05/2012, Volume 22, Issue 5, pp. 799 - 810
Recently, Wang introduced a novel (2, n ) region incrementing visual cryptographic scheme (RIVCS), which can gradually reconstruct secrets in a single image... 
visual secret sharing | Visualization | Image color analysis | Stacking | Authentication | Image secret sharing | Cryptography | secret sharing | Image reconstruction | visual cryptography | STEGANOGRAPHY | AUTHENTICATION | IMAGES | SHARING SECRETS | ENGINEERING, ELECTRICAL & ELECTRONIC | Measurement | Technology application | Image processing | Pixels | Innovations | Integers | Shadows | Circuits | Images | Texts | Security | Visual
Journal Article
Journal of real-time image processing, ISSN 1861-8219, 2015, Volume 14, Issue 1, pp. 61 - 73
Journal Article
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 12/2013, Volume 8, Issue 12, pp. 2059 - 2072
The visual cryptography scheme (VCS) is an encryption technique that utilizes the human visual system in recovering a secret image and it does not require any... 
visual secret sharing | Optimal contrast | Encryption | reversing operation | Cryptography | Image reconstruction | visual cryptography | Visual secret sharing | Visual cryptography | Reversing operation | COMPUTER SCIENCE, THEORY & METHODS | SECRET SHARING SCHEMES | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Complexity (New York, N.Y.), ISSN 1099-0526, 2019, Volume 2019, pp. 1 - 8
Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. However, in... 
MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | RECOMMENDATION | PASSPOINTS | MULTIDISCIPLINARY SCIENCES | Privacy | Application programming interface | Registration | Authentication | Passwords | Network security | International conferences | Polynomials | Strings | Surfing
Journal Article
EURASIP journal on wireless communications and networking, ISSN 1687-1499, 2018, Volume 2018, Issue 1, pp. 1 - 6
...) secret image sharing scheme capable of cheating detection Yan-Xiao Liu 1* , Qin-Dong Sun 1 and Ching-Nung Yang 2 Abstract In a (k, n) threshold secret image sharing... 
Information Systems Applications (incl.Internet) | Engineering | Signal,Image and Speech Processing | Cheating detection | Communications Engineering, Networks | Secret sharing | Secret image sharing | STEGANOGRAPHY | AUTHENTICATION | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Shadows | Cheating | Image reconstruction | Image detection
Journal Article
The Journal of systems and software, ISSN 0164-1212, 2007, Volume 80, Issue 7, pp. 1070 - 1076
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional... 
Steganography | Image secret sharing scheme | Authentication | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, THEORY & METHODS | image secret sharing scheme | steganography | authentication
Journal Article
Multimedia Tools and Applications, ISSN 1380-7501, 7/2015, Volume 74, Issue 14, pp. 5189 - 5203
Journal Article
Personal and Ubiquitous Computing, ISSN 1617-4909, 2/2018, Volume 22, Issue 1, pp. 11 - 22
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 2017, Volume 12, Issue 1, pp. 48 - 63
Journal Article
Journal of Real-Time Image Processing, ISSN 1861-8200, 1/2018, Volume 14, Issue 1, pp. 41 - 50
Journal Article
Personal and ubiquitous computing, ISSN 1617-4917, 2017, Volume 22, Issue 1, pp. 35 - 44
Journal Article
Journal of real-time image processing, ISSN 1861-8219, 2016, Volume 14, Issue 1, pp. 101 - 114
Journal Article
Symmetry (Basel), ISSN 2073-8994, 2019, Volume 11, Issue 1, p. 69
As a popular technology in information security, secret image sharing is a method to guarantee the secret image’s security. Usually, the dealer would decompose... 
Derivative polynomial | Essential secret image sharing | Lagrange interpolation | essential secret image sharing | derivative polynomial | MULTIDISCIPLINARY SCIENCES
Journal Article
International journal of theoretical physics, ISSN 1572-9575, 2017, Volume 57, Issue 1, pp. 195 - 207
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 01/2016, Volume 609, pp. 143 - 161
Recently, De Prisco and De Santis introduced a (k,n) colored-black-and-white visual cryptography scheme (CBW-VCS), which adopts colored pixels in shadow images... 
Visual secret sharing | Color shadow image | Visual cryptography | Extended visual cryptography | Black and white secret image | SHARING SCHEMES | SIZE | COMPUTER SCIENCE, THEORY & METHODS | Cryptography | Shadows | Construction | Images | Color | Computer information security | Image reconstruction | Visual
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 10/2012, Volume 16, Issue 10, pp. 1616 - 1619
A tag-collision problem in Radio Frequency Identification (RFID) system is the event that a reader cannot identify a tag if many tags respond to a reader at... 
Algorithm design and analysis | Computers | Protocols | Databases | query tree | Companies | RFID | EPC | Nickel | Radiofrequency identification | tag collision | COLLISION ARBITRATION | PROTOCOL | SYSTEMS | TELECOMMUNICATIONS | ANTICOLLISION | IDENTIFICATION | Radio frequency identification | Trees | Algorithms | Converting | Query processing | Electronics | Decimals | Readers
Journal Article