Sciweavers

36 search results - page 2 / 8
» Halftone visual cryptography
Sort
View
TOG
2008
118views more  TOG 2008»
13 years 9 months ago
Structure-aware halftoning
This paper presents an optimization-based halftoning technique that preserves the structure and tone similarities between the original and the halftone images. By optimizing an ob...
Wai-Man Pang, Yingge Qu, Tien-Tsin Wong, Daniel Co...
ICIP
2000
IEEE
14 years 11 months ago
Model-Based Inverse Halftoning with Wavelet-Vaguelette Deconvolution
In this paper, we demonstrate based on the linear model of [1, 2] that inverse halftoning is equivalent to the well-studied problem of deconvolution in the presence of colored noi...
Ramesh Neelamani, Robert Nowak, Richard G. Baraniu...
JEI
2002
133views more  JEI 2002»
13 years 9 months ago
Prediction of the texture visibility of color halftone patterns
Abstract. We propose a metric to predict the visibility of color halftone textures. This metric is represented by the critical viewing distance below which the halftone textures ca...
Muge Wang, Kevin J. Parker
VIROLOGY
2010
136views more  VIROLOGY 2010»
13 years 4 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
ICIP
2010
IEEE
13 years 7 months ago
Multiplexed clustered-dot halftone watermarks using bi-directional phase modulation and detection
We present a method for embedding and detection of visual watermark patterns in printed images that use clustered-dot halftones in the printing process. The method allows two inde...
Basak Oztan, Gaurav Sharma