| 元智大學 |
2013-12-02 |
Secret Hiding Mechanism Using QR Barcode
|
Pei-Yu Lin; Yi-Hui Chen; Eric Jui-Lin Lu; Ping-Jung Chen |
| 元智大學 |
2013-12-02 |
Secret Hiding Mechanism Using QR Barcode
|
Pei-Yu Lin; Yi-Hui Chen; Eric Jui-Lin Lu; Ping-Jung Chen |
| 亞洲大學 |
2007-04 |
Secret Image Hiding and Sharing Based on the (t, n)-Threshold
|
Chang, C. C. ; Lin, C. Y. ; Tseng, C. S. |
| 亞洲大學 |
2007 |
Secret Image Hiding and Sharing Based on the (t, n)-Threshold
|
林智揚;Lin, Chih-Yang;Chin-Chen Chang; |
| 國立交通大學 |
2014-12-08T15:41:53Z |
Secret image sharing
|
Thien, CC; Lin, JC |
| 國立交通大學 |
2020-10-05T01:59:51Z |
Secret Image Sharing Revisited: Forbidden Type, Support Type, and Their Two Approaches
|
Chao, Che-Yi; Lin, Ja-Chen |
| 元培科技大學 |
2008-10-14 |
Secret Image Sharing Safety
|
Wen-Pinn Fang |
| 中國醫藥大學 |
2008.08 |
Secret image sharing scheme based solely on ADDITION
|
(M.-H. Tsai); (C.-K. Chen); 陳永福(Yung-Fu Chen); (Y.-K. Chan); (K.-C. Chen); (Y.-P. Chu) |
| 亞洲大學 |
2007-11 |
Secret Image Sharing Using Quadratic Residues
|
Chang, C. C.;Chen, C. C |
| 國立交通大學 |
2014-12-08T15:40:31Z |
Secret image sharing with capability of share data reduction
|
Lin, CC; Tsai, WH |
| 亞洲大學 |
2003-07 |
Secret image sharing with capability of share data reduction
|
C. C. Lin;W. H. Tsai |
| 亞洲大學 |
2009-06 |
Secret Image Sharing with Reversible Steganography
|
Chang, C. C.; Lin, P. Y.;Chan, C. S |
| 亞洲大學 |
2009 |
Secret image sharing with reversible steganography
|
Chang, Chin-Chen ; Lin, Pei-Yu ; Chan, Chi-Shiang |
| 亞洲大學 |
2009 |
Secret image sharing with reversible steganography
|
詹啟祥;Chan, Chi-Shiang |
| 國立交通大學 |
2017-04-21T06:56:48Z |
Secret image sharing with smaller shadow sizes for general access structures
|
Chen, Ying-Ru; Chen, Ling-Hwei; Shyu, Shyong Jian |
| 國立交通大學 |
2014-12-08T15:37:20Z |
Secret image sharing with steganography and authentication
|
Lin, CC; Tsai, WH |
| 亞洲大學 |
2004 |
Secret image sharing with steganography and authentication
|
C. C. Lin;W. H. Tsai |
| 亞洲大學 |
2010 |
Secret image sharing with steganography and authentication using dynamic programming strategy
|
詹啟祥;Chan, Chi-Shiang |
| 國立交通大學 |
2014-12-08T15:09:54Z |
SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES
|
Chao, Kun-Yuan; Lin, Ja-Chen |
| 國立東華大學 |
2008-11 |
Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual Iryptography (S)chemes
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
| 國立東華大學 |
2007 |
Secret Image Transmission Based on VQ and Data Embedding
|
Lin,Shinfeng D; Shie,Shih-Chieh |
| 亞洲大學 |
2004 |
Secret multimedia information sharing with data hiding capability by simple logic operations
|
C. C. Lin;W. H. Tsai |
| 國立交通大學 |
2014-12-08T15:26:54Z |
Secret multimedia information sharing with data hiding capacity by simple logic operations
|
Lin, CC; Tsai, WH |
| 亞洲大學 |
2001-07 |
Secret multimedia information sharing with data hiding capacity by simple logic operations
|
C. C. Lin;W. H. Tsai |
| 亞洲大學 |
2009-11 |
Secret multimedia sharing with steganographic effects via PNG images
|
C. T. Yang;W. H. Tsai |