Author of the publication

The Security Defect of a Multi-pixel Encoding Method.

, , , , , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 39-48. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On (k, n) Visual Cryptography Scheme with t Essential Parties., , , , and . ICITS, volume 8317 of Lecture Notes in Computer Science, page 56-68. Springer, (2013)Information Security Display Technology with Multi-view Effect., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 198-208. (2016)Collusive Attacks to Partition Authentication Visual Cryptography Scheme., , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 238-250. (2016)On the Randomness of Visual Cryptography Scheme., , , , and . IIH-MSP, page 391-394. IEEE, (2013)Threshold Secret Image Sharing., , , , , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 404-412. Springer, (2013)Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square., , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 77:1-77:21 (2023)Temporal Integration Based Visual Cryptography Scheme and Its Application., , , and . IWDW, volume 10431 of Lecture Notes in Computer Science, page 406-419. Springer, (2017)The Security Defect of a Multi-pixel Encoding Method., , , , , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 39-48. Springer, (2013)A New Construction of Tagged Visual Cryptography Scheme., , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 433-445. Springer, (2015)