Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    On the Equivalence of Two Definitions of Visual Cryptography Scheme

    A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. To the best of our knowledge, th...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security Practice and Experience (2012)

  2. No Access

    Chapter and Conference Paper

    Multi-pixel Encryption Visual Cryptography

    A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. In their pioneer work, Naor and ...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security and Cryptology (2012)

  3. No Access

    Chapter and Conference Paper

    Flexible Visual Cryptography Scheme without Distortion

    For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...

    Feng Liu, Teng Guo, ChuanKun Wu, Ching-Nung Yang in Digital Forensics and Watermarking (2012)

  4. Chapter and Conference Paper

    Threshold Secret Image Sharing

    A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In...

    Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang in Information and Communications Security (2013)

  5. No Access

    Chapter and Conference Paper

    Visual Cryptography for Natural Images and Visual Voting

    Visual cryptography is a type of secret sharing which encodes a secret image into several shadow images in such a way that the stacking of certain images printed on transparencies will reveal the secret. The d...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security and Cryptology (2013)

  6. No Access

    Chapter

    Flexible Visual Cryptography Scheme and Its Application

    For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...

    Feng Liu, Teng Guo, ChuanKun Wu in Transactions on Data Hiding and Multimedia… (2014)

  7. No Access

    Chapter and Conference Paper

    On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

    In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\) ...

    Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang in Information Theoretic Security (2014)

  8. No Access

    Chapter and Conference Paper

    An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion

    In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...

    Wen Wang, Feng Liu, Weiqi Yan, Gang Shen, Teng Guo in Digital-Forensics and Watermarking (2016)

  9. No Access

    Chapter and Conference Paper

    Privacy Monitor

    This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful info...

    Teng Guo, Feng Liu, Wen Wang, BingTao Yu in Digital Forensics and Watermarking (2017)

  10. No Access

    Chapter and Conference Paper

    Temporal Integration Based Visual Cryptography Scheme and Its Application

    Visual cryptography scheme (VCS) is an image secret sharing method which exploits the spatial responds characteristics of Human visual system (HVS). Applications of traditional OR and XOR based VCSs are seriou...

    Wen Wang, Feng Liu, Teng Guo, Yawei Ren in Digital Forensics and Watermarking (2017)

  11. No Access

    Chapter and Conference Paper

    Information Security Display Technology with Multi-view Effect

    Information security is arousing wide attention of the world. Apart from the traditional attack on transmission process, threats specific to display terminals should not be ignored as well. In this paper, we i...

    Wen Wang, Feng Liu, Teng Guo, Yawei Ren, Gang Shen in Digital Forensics and Watermarking (2017)