Author of the publication

Information Security Display Technology with Multi-view Effect.

, , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 198-208. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Display Technology with Multi-view Effect., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 198-208. (2016)Collusive Attacks to Partition Authentication Visual Cryptography Scheme., , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 238-250. (2016)On (k, n) Visual Cryptography Scheme with t Essential Parties., , , , and . ICITS, volume 8317 of Lecture Notes in Computer Science, page 56-68. Springer, (2013)Threshold Secret Image Sharing., , , , , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 404-412. Springer, (2013)On the Randomness of Visual Cryptography Scheme., , , , and . IIH-MSP, page 391-394. IEEE, (2013)A new visual evaluation criterion of visual cryptography scheme for character secret image., , , and . Multim. Tools Appl., 78 (18): 25299-25319 (2019)Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square., , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 77:1-77:21 (2023)Temporal Integration Based Visual Cryptography Scheme and Its Application., , , and . IWDW, volume 10431 of Lecture Notes in Computer Science, page 406-419. Springer, (2017)The Security Defect of a Multi-pixel Encoding Method., , , , , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 39-48. Springer, (2013)Cheating prevention visual cryptography scheme using Latin square., , , , and . IET Inf. Secur., 11 (4): 211-219 (2017)