Sciweavers

36 search results - page 3 / 8
» Halftone visual cryptography
Sort
View
CORR
2008
Springer
108views Education» more  CORR 2008»
13 years 8 months ago
Polyomino-Based Digital Halftoning
In this work, we present a new method for generating a threshold structure. This kind of structure can be advantageously used in various halftoning algorithms such as clustered-do...
David Vanderhaeghe, Victor Ostromoukhov
DCC
2006
IEEE
14 years 8 months ago
Cheating in Visual Cryptography
Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
IJCNN
2000
IEEE
14 years 29 days ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang
IPL
2000
101views more  IPL 2000»
13 years 8 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
BILDMED
2009
160views Algorithms» more  BILDMED 2009»
13 years 9 months ago
Multimodal Visualization of DTI and fMRI Data Using Illustrative Methods
Designing multimodal visualizations combining anatomical and functional brain data is a demanding task. Jainek et al. [1] applied illustrative rendering techniques to obtain a high...
Silvia Born, Werner M. Jainek, Mario Hlawitschka, ...