These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
116 related articles for article (PubMed ID: 30296234)
21. Visual-cryptographic image hiding with holographic optical elements. Yang N; Gao Q; Shi Y Opt Express; 2018 Nov; 26(24):31995-32006. PubMed ID: 30650778 [TBL] [Abstract][Full Text] [Related]
22. Meaningful Secret Image Sharing with Saliency Detection. Cheng J; Yan X; Liu L; Jiang Y; Wang X Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851 [TBL] [Abstract][Full Text] [Related]
23. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Pan JS; Liu T; Yan B; Yang HM; Chu SC Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441 [TBL] [Abstract][Full Text] [Related]
24. Inverse halftoning based on the bayesian theorem. Liu YF; Guo JM; Lee JD IEEE Trans Image Process; 2011 Apr; 20(4):1077-84. PubMed ID: 20959269 [TBL] [Abstract][Full Text] [Related]
25. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability. Lee CW; Tsai WH IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424 [TBL] [Abstract][Full Text] [Related]
26. Data hiding watermarking for halftone images. Fu MS; Au OC IEEE Trans Image Process; 2002; 11(4):477-84. PubMed ID: 18244648 [TBL] [Abstract][Full Text] [Related]
27. AMBTC-based visual secret sharing with different meaningful shadows. Wang S; Lu Y; Yan X; Li L; Yu Y Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486 [TBL] [Abstract][Full Text] [Related]
28. Weighted visual secret sharing with multiple decryptions and lossless recovery. Liu F; Yan XH; Lu YL; Tan LD Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736 [TBL] [Abstract][Full Text] [Related]
29. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy. Lin YH; Hsia CH; Chen BY; Chen YY Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557 [TBL] [Abstract][Full Text] [Related]
30. Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction. Prasetyo H; Hsia CH; Wicaksono Hari Prayuda A J Imaging; 2021 Apr; 7(4):. PubMed ID: 34460520 [TBL] [Abstract][Full Text] [Related]
31. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. Hacimurtazaoglu M; Tutuncu K PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926 [TBL] [Abstract][Full Text] [Related]
32. A neural-network approach for visual cryptography and authorization. Yue TW; Chiang S Int J Neural Syst; 2004 Jun; 14(3):175-87. PubMed ID: 15243950 [TBL] [Abstract][Full Text] [Related]
33. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Sun Y; Yang CN; Yan X; Lu Y; Sun L Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552 [TBL] [Abstract][Full Text] [Related]
34. Comment on "Cheating prevention in visual cryptography". Chen YC; Horng G; Tsai DS IEEE Trans Image Process; 2012 Jul; 21(7):3319-23. PubMed ID: 22410333 [TBL] [Abstract][Full Text] [Related]
35. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing. Bao L; Yi S; Zhou Y IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684 [TBL] [Abstract][Full Text] [Related]
36. Neugebauer Models for Color Error Diffusion Halftoning. Wu K; Inoue K; Hara K J Imaging; 2020 Apr; 6(4):. PubMed ID: 34460725 [TBL] [Abstract][Full Text] [Related]
38. A Framework of Reversible Color-tograyscale Conversion with Watermarking Feature. Chan YH; Xu ZX; Lun PK IEEE Trans Image Process; 2019 Aug; ():. PubMed ID: 31449019 [TBL] [Abstract][Full Text] [Related]
39. Efficient dielectric metasurface hologram for visual-cryptographic image hiding. Li Z; Dong G; Yang D; Li G; Shi S; Bi K; Zhou J Opt Express; 2019 Jul; 27(14):19212-19217. PubMed ID: 31503684 [TBL] [Abstract][Full Text] [Related]
40. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. Devi BP; Singh KhM; Roy S Springerplus; 2016; 5(1):1091. PubMed ID: 27468392 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]