|
|
|
|
LEADER |
01000naa a22002652 4500 |
001 |
NLM216130069 |
003 |
DE-627 |
005 |
20231224031042.0 |
007 |
cr uuu---uuuuu |
008 |
231224s2012 xx |||||o 00| ||eng c |
024 |
7 |
|
|a 10.1109/TIP.2012.2190082
|2 doi
|
028 |
5 |
2 |
|a pubmed24n0720.xml
|
035 |
|
|
|a (DE-627)NLM216130069
|
035 |
|
|
|a (NLM)22410333
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Chen, Yu-Chi
|e verfasserin
|4 aut
|
245 |
1 |
0 |
|a Comment on "Cheating prevention in visual cryptography"
|
264 |
|
1 |
|c 2012
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ƒaComputermedien
|b c
|2 rdamedia
|
338 |
|
|
|a ƒa Online-Ressource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Date Completed 15.10.2012
|
500 |
|
|
|a Date Revised 01.12.2018
|
500 |
|
|
|a published: Print-Electronic
|
500 |
|
|
|a CommentOn: IEEE Trans Image Process. 2007 Jan;16(1):36-45. - PMID 17283763
|
500 |
|
|
|a Citation Status MEDLINE
|
520 |
|
|
|a Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem
|
650 |
|
4 |
|a Letter
|
650 |
|
4 |
|a Research Support, Non-U.S. Gov't
|
650 |
|
4 |
|a Comment
|
700 |
1 |
|
|a Horng, Gwoboa
|e verfasserin
|4 aut
|
700 |
1 |
|
|a Tsai, Du-Shiau
|e verfasserin
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
|d 1992
|g 21(2012), 7 vom: 11. Juli, Seite 3319-23
|w (DE-627)NLM09821456X
|x 1941-0042
|7 nnns
|
773 |
1 |
8 |
|g volume:21
|g year:2012
|g number:7
|g day:11
|g month:07
|g pages:3319-23
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1109/TIP.2012.2190082
|3 Volltext
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_NLM
|
912 |
|
|
|a GBV_ILN_350
|
951 |
|
|
|a AR
|
952 |
|
|
|d 21
|j 2012
|e 7
|b 11
|c 07
|h 3319-23
|