Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)
DOI: 10.1109/icip.2003.1247013
|View full text |Cite
|
Sign up to set email alerts
|

Halftone visual cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
104
0
2

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(106 citation statements)
references
References 4 publications
0
104
0
2
Order By: Relevance
“…Zhou and et al [10] explained Halftone visual cryptography and says that some of disadvantage in basic visual cryptography. The some important things are: The position of secret information pixel.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Zhou and et al [10] explained Halftone visual cryptography and says that some of disadvantage in basic visual cryptography. The some important things are: The position of secret information pixel.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The existing algorithm called Otsu algorithm [1] have an advantage of increased bit error rate while has a disadvantage on Image sharing capability. This was rectified to an extent by working with an algorithm based on Halftoning technique [10] . Visual Cryptography schemes are secret sharing schemes where the image is diffused into n number of transparencies.…”
Section: IImentioning
confidence: 99%
“…In 2006 the Zhi Zhou, Gonzalo, R.Arce and Giovanni Dicrescenzo [29][30][31][32][33] have proposed halftone visual cryptography which produce good quality and meaningful halftone shares, the generated halftone shares contain the visual information. In halftone visual cryptography a secret binary pixel "P" is encoded into an array of Q1 x Q2 ("m" in basic model) sub pixels, referred to as halftone cell in each of the "n" shares.…”
Section: Related Workmentioning
confidence: 99%