Author of the publication

Visual cryptography with extra ability of hiding confidential data.

, and . J. Electronic Imaging, 15 (2): 023020 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WEB-VC: Visual Cryptography for Web Image., , and . ICIP, page 4055-4059. IEEE, (2019)The family of universal axes.. Pattern Recognit., 29 (3): 477-485 (1996)Fragile watermarking for authenticating 3-D polygonal meshes., , , and . IEEE Trans. Multim., 7 (6): 997-1006 (2005)Color quantization by RWM-cut., and . ICDAR, page 669-672. IEEE Computer Society, (1995)0-8186-7128-9.Wavelet-Based Optical Flow Estimation., , and . ICPR, page 7068-7071. IEEE Computer Society, (2000)Visual cryptography with extra ability of hiding confidential data., and . J. Electronic Imaging, 15 (2): 023020 (2006)An image-sharing method with user-friendly shadow images., and . IEEE Trans. Circuits Syst. Video Techn., 13 (12): 1161-1169 (2003)Color quantization by preserving color distribution features, and . Signal Processing, 78 (2): 201--214 (October 1999)Color Image Compression by Moment-Preserving and Block Truncation Coding Techniques., , and . ICIP (3), page 972-976. IEEE Computer Society, (1994)Detecting number of folds by a simple mathematical property., , and . Pattern Recognit. Lett., 15 (10): 1081-1088 (1994)