Academic literature on the topic 'Expansion of Pixels'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Expansion of Pixels.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Expansion of Pixels"

1

Mukherjee, Subhadip, and Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion." International Journal of Natural Computing Research 8, no. 4 (2019): 13–27. http://dx.doi.org/10.4018/ijncr.2019100102.

Full text
Abstract:
Data hiding techniques are very significant in the research area of information security. In this article, the authors propose a new reversible data hiding (RDH) scheme using difference expansion. At first, the original image is partitioned into 3 × 3 pixel blocks, then marked Type-one and Type-two pixels based on their coordinate values. After that, the authors find correlated pixels by computing correlation coefficients and the median of Type-one pixels. Next, secret data bits are embedded within Type-two pixels based on correlated pixels and Type-one pixels based on the stego Type-two pixel
APA, Harvard, Vancouver, ISO, and other styles
2

Abdul Wahed, Md, and Hussain Nyeem. "Reversible data hiding with dual pixel-value-ordering and minimum prediction error expansion." PLOS ONE 17, no. 8 (2022): e0271507. http://dx.doi.org/10.1371/journal.pone.0271507.

Full text
Abstract:
Pixel Value Ordering (PVO) holds an impressive property for high fidelity Reversible Data Hiding (RDH). In this paper, we introduce a dual PVO (dPVO) for Prediction Error Expansion (PEE), and thereby develop a new RDH scheme to offer a better rate-distortion performance. Particularly, we propose to embed in two phases: forward and backward. In the forward phase, PVO with classic PEE is applied to every non-overlapping image block of size 1 × 3. In the backward phase, minimum-set and maximum-set of pixels are determined from the pixels predicted in the forward phase. The minimum set only contai
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Hongyin, Jinsha Yuan, and Sizu Hou. "Hybrid Predictor and Field-Biased Context Pixel Selection Based on PPVO." Mathematical Problems in Engineering 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/2585983.

Full text
Abstract:
Most pixel-value-ordering (PVO) predictors generated prediction-errors including −1 and 1 in a block-by-block manner. Pixel-based PVO (PPVO) method provided a novel pixel scan strategy in a pixel-by-pixel way. Prediction-error bin 0 is expanded for embedding with the help of equalizing context pixels for prediction. In this paper, a PPVO-based hybrid predictor (HPPVO) is proposed as an extension. HPPVO predicts pixel in both positive and negative orientations. Assisted by expansion bins selection technique, this hybrid predictor presents an optimized prediction-error expansion strategy includi
APA, Harvard, Vancouver, ISO, and other styles
4

Yuan, Junying, Huicheng Zheng, and Jiangqun Ni. "Efficient Reversible Data Hiding Using Two-Dimensional Pixel Clustering." Electronics 12, no. 7 (2023): 1645. http://dx.doi.org/10.3390/electronics12071645.

Full text
Abstract:
Pixel clustering is a technique of content-adaptive data embedding in the area of high-performance reversible data hiding (RDH). Using pixel clustering, the pixels in a cover image can be classified into different groups based on a single factor, which is usually the local complexity. Since finer pixel clustering seems to improve the embedding performance, in this manuscript, we propose using two factors for two-dimensional pixel clustering to develop high-performance RDH. Firstly, in addition to the local complexity, a novel factor was designed as the second factor for pixel clustering. Speci
APA, Harvard, Vancouver, ISO, and other styles
5

Kong, Xiaoxi, Wenguang He, and Zhanchuan Cai. "A Novel High-Fidelity Reversible Data Hiding Method Based on Adaptive Multi-pass Embedding." Mathematics 13, no. 11 (2025): 1881. https://doi.org/10.3390/math13111881.

Full text
Abstract:
In reversible data hiding, prediction error generation plays a crucial role, with pixel value ordering (PVO) standing out as a prediction method that achieves high fidelity. However, conventional PVO approaches select predicted pixels and their predictions independently, failing to fully exploit the inherent redundancy in ordered pixel sequences. This paper proposes a novel PVO-based prediction method that leverages the continuity and spatial correlation of ordering pixels. We first introduce a new prediction technique that exploits the redundancy of consecutive pixels. Our approach selects th
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Neng, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke, and Xu An Wang. "Reversible Data Hiding Scheme in Homomorphic Encrypted Image Based on EC-EG." Applied Sciences 9, no. 14 (2019): 2910. http://dx.doi.org/10.3390/app9142910.

Full text
Abstract:
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by the image owner has one reference pixel and eight target pixels. The n least significant bits (LSBs) of the reference pixel and all bits of target pixel are self-embedded into other parts of the image by a method of predictive error expansion (PEE). To avoid overflowing when embedding data, the n LSBs of the reference pixel are reset to zero bef
APA, Harvard, Vancouver, ISO, and other styles
7

He, Wenguang, Gangqiang Xiong, and Yaomin Wang. "Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding." Security and Communication Networks 2022 (January 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/2051058.

Full text
Abstract:
Recent reversible data hiding (RDH) work tends to realize adaptive embedding by discriminately modifying pixels according to image content. However, further optimization and computational complexity remain great challenges. By presenting a better incorporation of pixel value ordering (PVO) prediction and pairwise prediction-error expansion (PEE) technologies, this paper proposes a new RDH scheme. The largest/smallest three pixels of each block are utilized to generate error-pairs. To achieve optimization of the distribution of error pairs, two-layer embedding is introduced such that full-enclo
APA, Harvard, Vancouver, ISO, and other styles
8

Hayashi, Shinji, and Osamu Hasegawa. "Robust Face Detection for Low-Resolution Images." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 1 (2006): 93–101. http://dx.doi.org/10.20965/jaciii.2006.p0093.

Full text
Abstract:
Face detection, one of the most actively researched and progressive computer vision fields, has been little studied in low-resolution images. Using the AdaBoost-based face detector and MIT+CMU frontal face test set – the standard detector and images for evaluation in face detection – we found that face detection rate falls to 39% from 88% as face resolution decreases from 24×24 pixels to 6×6 pixels. We discuss a proposal using “portrait images,” “image expansion,” “frequency-band limitation of features” and “two-detector integration” and show that 71% of face detection rate is obtained for 6×6
APA, Harvard, Vancouver, ISO, and other styles
9

Di, Fuqiang, Minqing Zhang, Yingnan Zhang, and Jia Liu. "Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion." International Journal of Mobile Computing and Multimedia Communications 9, no. 4 (2018): 76–96. http://dx.doi.org/10.4018/ijmcmc.2018100105.

Full text
Abstract:
A novel reversible data hiding algorithm for encrypted image based on interpolation error expansion is proposed. The proposed method is an improved version of Shiu' s. His work does not make full use of the correlation of the neighbor pixels and some additional side information is needed. The proposed method adopts the interpolation prediction method to fully exploit the pixel correlation and employ the Paillier public key encryption method. The algorithm is reversible. In the proposed method, less side information is demanded. The experiment has verified the feasibility and effectiveness of t
APA, Harvard, Vancouver, ISO, and other styles
10

Manikandan, Vazhora Malayil, Nelapati Lava Prasad, and Masilamani Vedhanayagam. "Half Difference Expansion Based Reversible Data Hiding Scheme for Medical Image Forensics." Current Medical Imaging Formerly Current Medical Imaging Reviews 16, no. 4 (2020): 383–96. http://dx.doi.org/10.2174/1573405614666180903120018.

Full text
Abstract:
Background: Medical image authentication is an important area which attempts to establish ownership authentication and data authentication of medical images. Aims: In this paper, we propose a new reversible watermarking scheme based on a novel half difference expansion technique for medical image forensics. Methods: Conventional difference expansion based reversible watermarking scheme generates watermarked images with less visual quality, and the embedding rate was considerably less due to the high probability of overflow or underflow. In the proposed scheme, the quality of the watermarked im
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Expansion of Pixels"

1

Zoubian, Julien. "Observations cosmologiques avec un télescope grand champ spatial : Simulations pixels du spectromètre sans fente d'EUCLID." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4821/document.

Full text
Abstract:
Les observations des supernovae, du fond diffus cosmologique, et plus récemment la mesure des oscillations acoustiques des baryons et des effets de lentilles gravitationnelles faibles, favorisent le modèle cosmologique LambdaCDM pour lequel l'expansion de l'Univers est actuellement en accélération. Ce modèle fait appel à deux composants insaisissables, la matière sombre et l'énergie sombre. Deux approches semblent particulièrement prometteuses pour sonder à la fois la géométrie de l'Univers et la croissance des structures de matière noire, l'analyse des distorsions faibles des galaxies lointai
APA, Harvard, Vancouver, ISO, and other styles
2

Liao, Yu-Wei, and 廖育偉. "Visual Secret Sharing Techniques without Pixel Expansion." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/50077023046255178223.

Full text
Abstract:
碩士<br>亞洲大學<br>資訊科學與應用學系碩士班<br>96<br>Unlike traditional cryptography, visual secret sharing technology decodes a ciphertext by using human’s eyes. The traditional visual secret sharing technology must go through pixel expansion and decomposition to produce some meaningless images. In this thesis, we propose two kinds of visual secret sharing method. The first method is proposed to overcome the drawback of pixel expansion. Applying the first method, the second method goes further to produce meaningful images. For the first method, Visual Secret Sharing Techniques for Gray-level Image without Pix
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Ching-Chun, and 黃竫淳. "A Visual Secret Sharing Scheme without Pixel Expansion." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/37283035561843875606.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學研究所<br>92<br>Visual secret sharing (VSS) scheme is a cryptography technique, which protects the secret information by dividing the image into several share images. Since VSS scheme uses only the human vision system for decryption, advanced cryptographic knowledge and complex computation are not needed. Although the secret information will never be revealed from a single share image for the traditional VSS scheme, the image size of the share is substantially expanded that each pixel is mapped into a block consisting of several sub-pixels. This scheme greatly deteriorates ban
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Wen Li, and 張紋莉. "Hierarchical Twin Visual Secrets Sharing Schemes without Pixel Expansion." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78465336320544607465.

Full text
Abstract:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>96<br>Visual cryptology, the theme of this research, was first proposed by Naor and Shamir in 1994. Its greatest advantage in decryption requires only superimposing the share images, no complicated computation or cryptology is required. Most traditional visual cryptology technologies are based on pixel expansion, they produce share images that are far larger than the original secret images; and the halftoning is used to handle the gray-scale images. This research utilizes the techniques of bit-level analysis and superimposition to replace the traditional halfton
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yung-Chang, and 陳永昌. "Shift-Tolerant Visual Secret Sharing Scheme without Pixel Expansion." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/52555593990319395082.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊工程學系<br>104<br>Visual secret sharing(VSS) is a technology of image encryption, which does not requir any calculation at the time of decryption, just alone with the human visual system then the secret can be recovered. The concept of VSS is encrypting a secret image into two meaningless shares. We can only decrypt the secret image by stacking these shares together. Random grid, which is a skill for making a visual secret sharing scheme, the advantage is that it does not need the codebooks, and the size of each share will be the same size as the secret image. It is a simple a
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Ming-Chiang, and 陳明江. "Optimization of Pixel Expansion in Visual Secret Sharing Schemes." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88173183631128213634.

Full text
Abstract:
博士<br>臺灣大學<br>資訊工程學研究所<br>98<br>This dissertation studies both the problems of visual secret sharing and visual secret display which integrate the human visual intelligence into the design of securing the secret. We aim at designing the schemes for visual secret sharing with an efficient pixel expansion and the schemes for visual secret display with respect to multiple binary secrets as well as color secrets. Visual secret sharing is a cryptographic technique for distributing the secret image among the participants in such a way that the secret is encrypted into the shares of transparencies wh
APA, Harvard, Vancouver, ISO, and other styles
7

Fang, Li-Chin, and 方儷瑾. "A Hierarchical Visual Multi-Secret Sharing Scheme without Pixel Expansion." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/07232603250679221563.

Full text
Abstract:
碩士<br>中興大學<br>資訊科學系所<br>95<br>Traditional visual secret sharing scheme has provided sufficient security for a secret image by breaking it into share images (called shares). In current technology, multiple secret images can be hidden in the same set of shares after one of the shares is rotated at different degrees. However, these schemes are limited to (2, 2) or (3, 3)-visual secret sharing. Furthermore, the sizes of the shares will be expanded. In this thesis, we propose an improved visual multi-secret sharing scheme that adopts a hierarchical concept to manage the shares. The first secret
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Hung-Wei, and 江宏瑋. "Minimization of Pixel Expansions in Visual Multiple Secret Sharing Schemes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/81478750764787542305.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊工程學系碩士班<br>99<br>As the amount of digital information and the spread via various communication networks grow nowadays, the information security becomes an important issue. Visual Cryptography was proposed in this circumstance. The most attractive merit of Visual Cryptography is that the decoding process relies on the human visual system instead of any computing device. It has been more than fifteen years since Naor and Shamir proposed Visual Cryptography in EuroCrypt’94. Fruitful research results in this area can be found in the literature reviews including threshold visual cry
APA, Harvard, Vancouver, ISO, and other styles
9

Chiue, Ting-Yu, and 闕廷宇. "A Visual Cryptography Scheme for Gray-level Images without Pixel Expansion by Block Coding." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/44576072588904608179.

Full text
Abstract:
碩士<br>中原大學<br>電機工程研究所<br>97<br>In this thesis, we propose a scheme for gray-level images without pixel expansion. It solves the difficulty in carrying shares by using pixel expansion scheme and the requirement of more storage space. Our method can present three different levels of black sub-block and encrypt multi pixels at the same time. This makes the stacked image has better visual quality. In the proposed scheme, we utilize the method, block coding, to encrypt the secret image and reach the purpose of pixel unexpansion. At first, we divide the secret image (x × y pixels) into n sub-blo
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Tsung-Lieh, and 林琮烈. "A Study on Visual Secret Sharing Schemes without Pixel Expansion for Multiple Secret Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/44430331617805548112.

Full text
Abstract:
博士<br>國立臺灣科技大學<br>電機工程系<br>98<br>Visual Cryptography (VC), which proposed by Naor and Shamir is a perfect technique to share and protect secret image. During the decryption process, the Visual Cryptography scheme can recognizes the secret image by using the visual system of human being only; no need of any other computational devices. Because this special property doesn’t need any computational devices to recognize the secret image during the decryption process, Visual Cryptography is suited to be used in the environment which has no computational device. There are many researchers who have de
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Expansion of Pixels"

1

Tejawat, Mahesh, and Rajarshi Pal. "Detecting Tampered Cheque Images Using Difference Expansion Based Watermarking with Intelligent Pairing of Pixels." In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2538-6_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Praveen, Kanakkath, and M. Sethumadhavan. "Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-6872-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Shenchuan, Masaaki Fujiyoshi, and Hitoshi Kiya. "A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion." In Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43886-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stuhlmacher, Michelle, and Ran Goldblatt. "Urban Environments." In Cloud-Based Remote Sensing with Google Earth Engine. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26588-4_33.

Full text
Abstract:
AbstractUrbanization has dramatically changed Earth’s surface. This chapter starts with a qualitative look at the impact urban expansion has on the landscape, covering three existing urban classification schemes that have been created by other remote sensing scientists. We look at how these classifications can be used to quantify urban areas, and close with instructions on how to perform per-pixel supervised image classification to map built-up land cover at any location on Earth and at any point in time using Landsat 7 imagery.
APA, Harvard, Vancouver, ISO, and other styles
5

Sirhindi, Rabia, Mehreen Afzal, and Saeed Murtaza. "An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Wen, Feng Liu, Weiqi Yan, Gang Shen, and Teng Guo. "An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion." In Digital-Forensics and Watermarking. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31960-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Debasis, Giri, Jana Biswapati, and Mondal Shyamal Kumar. "Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference Expansion." In Advances in Intelligent Systems and Computing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2752-6_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hoa, Le Quang, Cao Thi Luyen, Nguyen Kim Sao, and Pham Van At. "An Improved Reversible Watermarking Based on Pixel Value Ordering and Prediction Error Expansion." In Intelligent Information and Database Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42058-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Lee-Jang, Fang-Ping Pai, Ying-Hsuan Huang, and Ching-Ya Tseng. "High Capacity Data Hiding for AMBTC Decompressed Images Using Pixel Modification and Difference Expansion." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82196-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Geetha, R., and S. Geetha. "Improved Reversible Data Embedding in Medical Images Using I-IWT and Pairwise Pixel Difference Expansion." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8660-1_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Expansion of Pixels"

1

Muzli, Alfarabi, Adifa Widyadhani Chanda D’Layla, Ntivuguruzwa Jean De La Croix, and Tohari Ahmad. "PairStruct: A Steganography Algorithm Based on Image Structure and Pair-Pixels Difference Expansion." In 2025 5th International Conference on Advanced Research in Computing (ICARC). IEEE, 2025. https://doi.org/10.1109/icarc64760.2025.10963215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Delenia, Erick, Ntivuguruzwa Jean De La Croix, and Tohari Ahmad. "Enhancing Steganography in Digital Images Through Neighboring Pixel Differences Expansion." In 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2024. https://doi.org/10.1109/etncc63262.2024.10767473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Liusheng, Babar Hussain, Xianbo Li, Guang Zhu, and C. Patrick Yue. "A Micro-LED Driver with Bandwidth Expansion for Visible Light Communications." In JSAP-OSA Joint Symposia. Optica Publishing Group, 2017. http://dx.doi.org/10.1364/jsap.2017.6p_a410_5.

Full text
Abstract:
Visible light communication (VLC) using LEDs has generated strong research interest recently [1, 2]. Many existing LEDs in display applications can be employed as transmitters for the further deployment of VLC. The first active matrix LED (AMLED) micro-display with an embedded VLC transmitter was reported in [2], with a 5-Mb/s modulation bit rate. This paper presents an AMLED system, consisting of a proposed CMOS pixel driver and a flip-chip bonded blue gallium nitride (GaN) micro-LED (μLED) array with 36×64 pixels of 40×40 μm2, for simultaneous display and VLC applications. Measurement result
APA, Harvard, Vancouver, ISO, and other styles
4

Mao, M., T. Perazzo, O. Kwon, et al. "Infrared Vision Using an Uncooled Thermo-Opto-Mechanical Camera: Design, Microfabrication, and Performance." In ASME 1999 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/imece1999-0285.

Full text
Abstract:
Abstract An uncooled infrared (IR) camera that is based on thermomechanical sensing and visible optical readout has been developed. The system contains a focal plane array (FPA) consisting of bimaterial cantilever beams made of silicon nitride (SiNx) and gold (Au) in each pixel. Absorption of incident IR radiation in the 8–14 μm wavelength range by SiNx in each cantilever beam raises its temperature, resulting in proportional deflection due to mismatch in thermal expansion of the two cantilever materials. To maximize the thermal performance, the conductance of each pixel was reduced to about f
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Chin-Feng, Jau Ji Shen, and Yu Hua Lai. "Data Hiding Using Multi-Pixel Difference Expansion." In 2018 3rd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/ccoms.2018.8463244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weng, Chi-Yao, Chun-I. Fan, Chin-Feng Lee, and Shiu-Jeng Wang. "Predictive pixel differencing expansion in data reversibility scheme." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Ching-Lin, Ching-Te Wang, and Meng-Lin Chiang. "The image multiple secret sharing schemes without pixel expansion." In 2011 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2011. http://dx.doi.org/10.1109/icmlc.2011.6017028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Monoth, Thomas, and Anto P. Babu. "Recursive Visual Cryptography Using Random Basis Column Pixel Expansion." In 10th International Conference on Information Technology (ICIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/icit.2007.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kobayashi, Keita, Hiroyuki Tsuji, and Tomoaki Kimura. "An image expansion method by using sub-pixel information." In 2013 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS). IEEE, 2013. http://dx.doi.org/10.1109/ispacs.2013.6704623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thankappan, Anila, and M. Wilscy. "(2,3) RIVC Scheme in Visual Cryptography without Pixel Expansion." In 2013 2nd International Conference on Advanced Computing, Networking and Security (ADCONS). IEEE, 2013. http://dx.doi.org/10.1109/adcons.2013.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!