-
Article
An Interesting Complex: [Cd(l -trp) (d-trp)] n
A novel coordination polymer [Cd(l-trp) (d-trp)] n (where l-trp and d-trp are l-tryptophan and d-tryptophan or (S)-2-amino-3-(3-indolyl)propionic acid and (R)-2-amino-3-(3-indol...
-
Chapter and Conference Paper
On the Equivalence of Two Definitions of Visual Cryptography Scheme
A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. To the best of our knowledge, th...
-
Chapter and Conference Paper
Multi-pixel Encryption Visual Cryptography
A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. In their pioneer work, Naor and ...
-
Chapter and Conference Paper
Flexible Visual Cryptography Scheme without Distortion
For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...
-
Chapter and Conference Paper
Threshold Secret Image Sharing
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In...
-
Chapter and Conference Paper
Visual Cryptography for Natural Images and Visual Voting
Visual cryptography is a type of secret sharing which encodes a secret image into several shadow images in such a way that the stacking of certain images printed on transparencies will reveal the secret. The d...
-
Chapter
Flexible Visual Cryptography Scheme and Its Application
For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...
-
Chapter and Conference Paper
On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties
In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\) ...
-
Chapter and Conference Paper
The Security Defect of a Multi-pixel Encoding Method
A visual cryptography scheme (VCS) encodes a secret image into several share images, such that stacking sufficient number of shares will reveal the secret while insufficient number of shares provide no informa...
-
Article
Open AccessNanostructured lipid carriers for percutaneous administration of alkaloids isolated from Aconitum sinomontanum
Lipid-based nanosystems have great potential for transdermal drug delivery. In this study, nanostructured lipid carriers (NLCs) for short-acting alkaloids lappacontine (LA) and ranaconitine (RAN) isolated from Ac...
-
Chapter and Conference Paper
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion
In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...
-
Chapter and Conference Paper
Privacy Monitor
This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful info...
-
Chapter and Conference Paper
Temporal Integration Based Visual Cryptography Scheme and Its Application
Visual cryptography scheme (VCS) is an image secret sharing method which exploits the spatial responds characteristics of Human visual system (HVS). Applications of traditional OR and XOR based VCSs are seriou...
-
Chapter and Conference Paper
Information Security Display Technology with Multi-view Effect
Information security is arousing wide attention of the world. Apart from the traditional attack on transmission process, threats specific to display terminals should not be ignored as well. In this paper, we i...
-
Article
SrZn2(PO4)2–TiO2 composite microwave dielectric ceramics with wide tunability range for temperature coefficient of resonant frequency
A phosphate based composite ceramics system, (1 − x)SrZn2(PO4)2–xTiO2 (0 ≤ x ≤ 0.5), was prepared by the solid-state reaction method, and the relations between the phase composition, crystal structure and microwa...
-
Article
p-Type CuFeO2 nanoflakes prepared by sodium alginate-assisted hydrothermal method for photoelectrochemical water reduction
p-Type delafossite CuFeO2 is a promising material for photoelectrochemical water reduction due to its significant light absorption, chemical stability, and earth abundance. Herein, the CuFeO2 nanoflakes are synth...
-
Article
Microwave dielectric properties of NaBaPO4 ceramics with fast sintering properties
Phosphate compound with mixed cations, NaBaPO4 can be a new candidate of microwave dielectric ceramics with the basis of the systematically investigations of the ternary compound series of AMPO4 (A = Li, Na, K; M...
-
Article
Real-time monitoring and quantification of organic by-products and mechanism study of acetone decomposition in a dielectric barrier discharge reactor
Non-thermal plasma (NTP) degradation of low-concentration acetone was investigated in a cylindrical dielectric barrier discharge reactor. The effects of oxygen content and flow rate on the removal efficiency a...
-
Article
Transcutol® P/Cremophor® EL/Ethyl Oleate–Formulated Microemulsion Loaded into Hyaluronic Acid–Based Hydrogel for Improved Transdermal Delivery and Biosafety of Ibuprofen
In the present study, a novel transdermal delivery system was developed and its advantages were demonstrated. Ibuprofen is a commonly used anti-inflammatory, antipyretic, and analgesic drug; however, because o...
-
Chapter and Conference Paper
DEFINE: Friendship Detection Based on Node Enhancement
Network representation learning (NRL) is a matter of importance to a variety of tasks such as link prediction. Learning low-dimensional vector representations for node enhancement based on nodes attributes and...