X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (4) 4
algorithms (3) 3
computer science, theory & methods (3) 3
encryption (3) 3
image contrast (3) 3
coding and information theory (2) 2
combinatorics (2) 2
contrast (2) 2
data encryption (2) 2
data structures, cryptology and information theory (2) 2
discrete mathematics in computer science (2) 2
information and communication, circuits (2) 2
mathematics (2) 2
mathematics, applied (2) 2
pixel expansion (2) 2
random grids (2) 2
scheme (2) 2
05b05 (1) 1
94a60 (1) 1
94b05 (1) 1
adaptive algorithms (1) 1
arithmetic coding (1) 1
arithmetic encryption (1) 1
authentication (1) 1
block design (1) 1
boolean algebra (1) 1
boolean operations (1) 1
codebook (1) 1
coding (1) 1
computer science (1) 1
computer science, artificial intelligence (1) 1
computer science, information systems (1) 1
computer science, software engineering (1) 1
computer simulation (1) 1
decoding (1) 1
digital media (1) 1
embedding (1) 1
engineering, electrical & electronic (1) 1
growth (1) 1
image compression (1) 1
image enhancement (1) 1
image quality (1) 1
image reconstruction (1) 1
image restoration (1) 1
joint compression-encryption algorithm (1) 1
kronecker algebra (1) 1
l 1 -norm (1) 1
l-1-norm (1) 1
meaningful shares (1) 1
minimum distance bounds (1) 1
new codes (1) 1
norm (1) 1
object recognition (1) 1
pattern recognition (1) 1
physics, multidisciplinary (1) 1
polyvinyl chloride (1) 1
preservation (1) 1
priority (1) 1
privacy (1) 1
privacy preservation (1) 1
progressive classification encryption (1) 1
progressive dimension growth (1) 1
progressive optimality (1) 1
progressive reconstruction (1) 1
progressive scrambling (1) 1
progressive visual cryptography (1) 1
progressive visual secret sharing (1) 1
quasi-cyclic codes (1) 1
relative contrast (1) 1
search algorithm (1) 1
secret images (1) 1
secret sharing (1) 1
secret sharing scheme (1) 1
series (1) 1
shadow (1) 1
social media analysis (1) 1
social networks (1) 1
stacking (1) 1
tensor product (1) 1
tensors (1) 1
threshold (1) 1
unbalanced vcs (1) 1
unexpanded shares (1) 1
user profile and activities (1) 1
venture capital (1) 1
verifiable visual cryptography (1) 1
visual cryptography (1) 1
watermarking (1) 1
仿真结果 (1) 1
关节 (1) 1
加密算法 (1) 1
压缩过程 (1) 1
图像压缩算法 (1) 1
离散小波变换 (1) 1
编码技术 (1) 1
自适应算术编码 (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


中国物理B:英文版, ISSN 1674-1056, 2013, Volume 22, Issue 9, pp. 403 - 408
Journal Article
Pattern analysis and applications : PAA, ISSN 1433-755X, 2016, Volume 21, Issue 1, pp. 139 - 166
In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing... 
Pattern Recognition | Unexpanded shares | Authentication | Computer Science | Watermarking | Progressive visual cryptography | Verifiable visual cryptography | Secret sharing | Meaningful shares | SCHEME | RANDOM GRIDS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | SECRET IMAGES | Computer science | Cryptography | Venture capital
Journal Article
Designs, codes, and cryptography, ISSN 1573-7586, 2009, Volume 55, Issue 1, pp. 19 - 35
Journal Article
MULTIMEDIA TOOLS AND APPLICATIONS, ISSN 1380-7501, 05/2020, Volume 79, Issue 17-18, pp. 11459 - 11486
Progressive Visual Secret Sharing (PVSS) is a Visual Secret Sharing scheme which shares a secret image among multiple users and during the decryption this... 
ENCRYPTION | Progressive visual secret sharing | Priority | COMPUTER SCIENCE, INFORMATION SYSTEMS | Random grids | CRYPTOGRAPHY | ENGINEERING, ELECTRICAL & ELECTRONIC | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | Codebook | IMAGES | SHADOW | COMPUTER SCIENCE, THEORY & METHODS | Threshold | Image quality | Encryption | Image reconstruction | Image contrast
Journal Article
Designs, Codes and Cryptography, ISSN 0925-1022, 11/2007, Volume 45, Issue 2, pp. 213 - 217
Journal Article
Information Security Journal: A Global Perspective, ISSN 1939-3555, 01/2018, Volume 27, Issue 1, pp. 14 - 28
... data, or data can be permanently lost when the computer is damaged. Also, more secure cryptosystems use complex mathematical issue in the encryption process... 
Boolean operations | Visual cryptography | pixel expansion | progressive reconstruction | contrast | Boolean algebra | Cryptography | Stacking | Image enhancement | Image contrast
Journal Article
International Journal of Digital Crime and Forensics, ISSN 1941-6210, 04/2018, Volume 10, Issue 2, pp. 56 - 73
Despite research work achieving progress in preserving the privacy of user profiles and visual surveillance, correcting problems in social media have not taken... 
Privacy preservation | User profile and activities | Progressive scrambling | Tensor product | Social media analysis | Privacy | Digital media | Tensors | Algorithms | Preservation | Social networks | Image restoration
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.