Sciweavers

36 search results - page 3 / 8
» Halftone visual cryptography
Sort
View
92
Voted
CORR
2008
Springer
108views Education» more  CORR 2008»
14 years 9 months ago
Polyomino-Based Digital Halftoning
In this work, we present a new method for generating a threshold structure. This kind of structure can be advantageously used in various halftoning algorithms such as clustered-do...
David Vanderhaeghe, Victor Ostromoukhov
65
Voted
DCC
2006
IEEE
15 years 9 months ago
Cheating in Visual Cryptography
Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
IJCNN
2000
IEEE
15 years 2 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang
66
Voted
IPL
2000
101views more  IPL 2000»
14 years 9 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
BILDMED
2009
160views Algorithms» more  BILDMED 2009»
14 years 10 months ago
Multimodal Visualization of DTI and fMRI Data Using Illustrative Methods
Designing multimodal visualizations combining anatomical and functional brain data is a demanding task. Jainek et al. [1] applied illustrative rendering techniques to obtain a high...
Silvia Born, Werner M. Jainek, Mario Hlawitschka, ...