Sciweavers

977 search results - page 59 / 196
» Secret image sharing
Sort
View
IPL
2000
101views more  IPL 2000»
15 years 3 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
ICIP
2005
IEEE
16 years 5 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 7 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
SIGGRAPH
1997
ACM
15 years 8 months ago
The two-user Responsive Workbench: support for collaboration through individual views of a shared space
We present the two-user Responsive Workbench: a projectionbased virtual reality system that allows two people to simultaneously view individual stereoscopic image pairs from their...
Maneesh Agrawala, Andrew C. Beers, Ian McDowall, B...
EUROGRAPHICS
2010
Eurographics
15 years 5 months ago
Shared Sampling for Real-Time Alpha Matting
Image matting aims at extracting foreground elements from an image by means of color and opacity (alpha) estimation. While a lot of progress has been made in recent years on impro...
Eduardo S. L. Gastal and Manuel M. Oliveira