咨询与建议

限定检索结果

文献类型

  • 449 篇 期刊文献
  • 351 篇 会议
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 739 篇 工学
    • 539 篇 计算机科学与技术...
    • 299 篇 电气工程
    • 149 篇 软件工程
    • 130 篇 信息与通信工程
    • 69 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 30 篇 光学工程
    • 27 篇 仪器科学与技术
    • 23 篇 网络空间安全
    • 18 篇 机械工程
    • 8 篇 材料科学与工程(可...
    • 5 篇 石油与天然气工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 测绘科学与技术
    • 4 篇 交通运输工程
    • 3 篇 航空宇航科学与技...
  • 113 篇 理学
    • 61 篇 物理学
    • 43 篇 数学
    • 6 篇 系统科学
    • 5 篇 生物学
  • 42 篇 医学
    • 34 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 40 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 7 篇 公共管理
    • 4 篇 图书情报与档案管...
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 5 篇 文学
    • 5 篇 新闻传播学
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 4 篇 艺术学
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 经济学

主题

  • 803 篇 visual cryptogra...
  • 154 篇 secret sharing
  • 133 篇 visual secret sh...
  • 58 篇 pixel expansion
  • 41 篇 steganography
  • 39 篇 random grid
  • 36 篇 authentication
  • 35 篇 security
  • 33 篇 cryptography
  • 32 篇 secret image sha...
  • 32 篇 random grids
  • 31 篇 encryption
  • 31 篇 watermarking
  • 28 篇 contrast
  • 27 篇 secret sharing s...
  • 26 篇 image encryption
  • 22 篇 copyright protec...
  • 21 篇 general access s...
  • 20 篇 digital watermar...
  • 18 篇 xor

机构

  • 19 篇 natl dong hwa un...
  • 15 篇 chinese acad sci...
  • 13 篇 zhengzhou inform...
  • 11 篇 north china elec...
  • 11 篇 jinan univ dept ...
  • 10 篇 harbin inst tech...
  • 10 篇 univ salerno dip...
  • 9 篇 hefei elect engn...
  • 9 篇 natl chiayi univ...
  • 8 篇 natl chiayi univ...
  • 6 篇 tsinghua univ de...
  • 6 篇 univ chinese aca...
  • 6 篇 zhengzhou inform...
  • 6 篇 sun yat sen univ...
  • 6 篇 sun yat sen univ...
  • 6 篇 natl dong hwa un...
  • 5 篇 yanbian univ dep...
  • 5 篇 natl dong hwa un...
  • 5 篇 natl taiwan univ...
  • 5 篇 univ chinese aca...

作者

  • 41 篇 yang ching-nung
  • 22 篇 yan xuehu
  • 21 篇 wu xiaotian
  • 17 篇 chen tzung-her
  • 17 篇 liu feng
  • 17 篇 yu bin
  • 14 篇 lu yuliang
  • 13 篇 li peng
  • 13 篇 fu zhengxin
  • 11 篇 liu lintao
  • 11 篇 shyu shyong jian
  • 9 篇 shi yishi
  • 8 篇 hou young-chang
  • 8 篇 shen gang
  • 8 篇 wu chuankun
  • 7 篇 wang shen
  • 7 篇 de prisco robert...
  • 7 篇 wang ran-zan
  • 7 篇 de santis a
  • 7 篇 wang daoshun

语言

  • 766 篇 英文
  • 22 篇 其他
  • 13 篇 中文
  • 2 篇 法文
  • 1 篇 土耳其文
检索条件"主题词=visual cryptography"
803 条 记 录,以下是1-10 订阅
排序:
visual cryptography
VISUAL CRYPTOGRAPHY
收藏 引用
International Conference on Advanced Computer Theory and Engineering (ICACTE 2008)
作者: Ashutosh, R. Sen, Sayan Dev Heritage Inst Technol Kolkata India
In this paper, we propose a visual Cryptographic system which can be used to hide the original image information from an intruder or an unwanted user. The images can be in any standard format. The encrypted image is s... 详细信息
来源: 评论
EVCS-DAS: Evolving visual cryptography Schemes for Dynamic Access Structures
收藏 引用
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS 2025年 第3期21卷 1-27页
作者: Wu, Xiaotian Feng, Xinjie Chen, Bing Yang, Ching-nung Peng, Qing-yu Yan, WeiQi Jinan Univ Guangzhou Peoples R China Guangdong Polytech Normal Univ Guangzhou Peoples R China Natl Dong Hwa Univ Shoufeng Taiwan Auckland Univ Technol Sch Engn Comp & Math Sci Auckland New Zealand
A systematic investigation of evolving visual cryptography scheme (EVCS) is carried out in this article. The evolving scheme, denoted as (k, oo), differs from the (k, n) threshold in that it permits an arbitrary and p... 详细信息
来源: 评论
Multi-Party Reversible Data Hiding in Ciphertext Binary Images Based on visual cryptography
收藏 引用
IEEE SIGNAL PROCESSING LETTERS 2025年 32卷 1560-1564页
作者: Chen, Bing Yu, Jingkun Feng, Bingwen Lu, Wei Cai, Jun Guangdong Polytech Normal Univ Sch Cyber Secur Guangzhou 510665 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Sun Yat sen Univ Sch Comp Sci & Engn Guangdong Prov Key Lab Informat Secur Technol Minist EducKey Lab Informat Technol Guangzhou 510006 Peoples R China
Existing methods for reversible data hiding in ciphertext binary images only involve one data hider to perform data embedding. When the data hider is attacked, the original binary image cannot be perfectly reconstruct... 详细信息
来源: 评论
Border Collie Shuffled Shepherd optimization-based image reconstruction using visual cryptography
收藏 引用
IMAGING SCIENCE JOURNAL 2025年 第1期73卷 30-45页
作者: Sajitha, A. S. Priya, S. Sridevi Sathya Sanish, V. S. Karunya Inst Technol & Sci Elect & Commun Engn Coimbatore 641114 India Jawaharlal Coll Engn & Technol Elect & Commun Engn Palakkad India
The visual secret sharing (VSS) technique is an encryption model to conceal secret messages into two or more meaningless images, called shares. Information loss is a huge drawback in existing systems. An efficient mod... 详细信息
来源: 评论
Enhanced Reconfigurable visual cryptography Strategies Utilizing Optical Metasurfaces
收藏 引用
ACS APPLIED MATERIALS & INTERFACES 2025年 第7期17卷 11300-11308页
作者: Wu, Xianfeng Xue, Yulin Shi, Zhongyu Li, Zhenfei Du, Shuo Song, Kun Liu, Yahong Geng, Guangzhou Zhu, Weiren Zhao, Xiaopeng Northwestern Polytech Univ Dept Appl Phys Smart Mat Lab Xian 710129 Peoples R China BOE Technol Grp Co Ltd Beijing 100176 Peoples R China Shanghai Jiao Tong Univ Dept Elect Engn Shanghai 200240 Peoples R China Chinese Acad Sci Beijing Natl Lab Condensed Matter Phys Inst Phys Beijing 100190 Peoples R China
The secure storage and transmission of information are core measures that ensure data security. Within intricate information landscapes, reconfigurable encryption mechanisms serve as robust defenses against potential ... 详细信息
来源: 评论
Integrating visual cryptography for Efficient and Secure Image Sharing on Social Networks
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第8期15卷
作者: Ren, Lijing Zhang, Denghui Guangdong Mech & Elect Polytech Inst Artificial Intelligence Guangzhou 510555 Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510555 Peoples R China
The widespread use of smart devices, such as phones and live-streaming cameras, has ushered in an era where digital images can be captured and shared on social networks anytime and anywhere. Sharing images demands mor... 详细信息
来源: 评论
A Door Lock System Based on visual cryptography  2nd
A Door Lock System Based on Visual Cryptography
收藏 引用
2nd International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chao, Chang-Yu Chang, Jen-Chun Wang, Ching-Cheng Chen, Chi-Sheng Chung, Hao-Hsuan Lu, Kuan-Han Huang, Guan-Ying National Taipei University New Taipei City Taiwan
A visual cryptography Scheme (VCS) is a unique data hiding technique aimed at decomposing secret information into multiple images, referred to as shares. These individual images, when viewed in isolation, are incapabl... 详细信息
来源: 评论
CRP2-VCS: Contrast-Oriented Region-based Progressive Probabilistic visual cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving College of Cyber Security College of Information Science and Technology Guangzhou China Auckland University of Technology Department of Computer and Information Systems Auckland New Zealand Jinan University Sino-French Joint Laboratory for Astrometry Dynamics and Space Science Guangzhou China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
visual cryptography for Biometric Privacy
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2011年 第1期6卷 70-81页
作者: Ross, Arun Othman, Asem W Virginia Univ Dept Comp Sci & Elect Engn Morgantown WV 26506 USA
Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting priva... 详细信息
来源: 评论
visual cryptography schemes with optimal pixel expansion
收藏 引用
THEORETICAL COMPUTER SCIENCE 2006年 第1-3期369卷 169-182页
作者: Blundo, Carlo Cimato, Stelvio De Santis, Alfredo Univ Salerno Dipartimento Informat & Applicaz I-84081 Baronissi SA Italy Univ Milan Dipartimento Tecnol Informaz I-26013 Crema CR Italy
A visual cryptography scheme encodes a black and white secret image into n shadow images called shares which are distributed to the it participants. Such shares are such that only qualified subsets of participants can... 详细信息
来源: 评论