| ²é¿´: 548 | »Ø¸´: 2 | |||
| ±¾Ìû²úÉú 1 ¸ö LS-EPI £¬µã»÷ÕâÀï½øÐв鿴 | |||
gamefzx½ð³æ (ÕýʽдÊÖ)
|
[ÇóÖú]
ÇóÎÄÏ×ÊÇ·ñSCI¼ìË÷
|
||
|
ÎÄÕÂÃû³Æ£ºOptimal pixel expansion of deterministic visual cryptography scheme DOI£º10.1007/s11042-013-1625-3 ÆÚ¿¯ÊÇSCI¼ìË÷µÄ£¬²»ÖªµÀÎÄÕ¼ìË÷ÁËô£¬ÇóÖú¸÷λ´óÉñ£¡ |
» ²ÂÄãϲ»¶
284Çóµ÷¼Á
ÒѾÓÐ10È˻ظ´
һ־Ըɽ¶«´óѧҩѧѧ˶Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
07»¯Ñ§280·ÖÇóµ÷¼Á
ÒѾÓÐ4È˻ظ´
298-Ò»Ö¾Ô¸Öйúũҵ´óѧ-Çóµ÷¼Á
ÒѾÓÐ12È˻ظ´
Çó²ÄÁÏ£¬»·¾³×¨Òµµ÷¼Á
ÒѾÓÐ3È˻ظ´
335Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
Ò»Ö¾Ô¸¼ª´ó»¯Ñ§322Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
»·¾³Ñ§Ë¶288Çóµ÷¼Á
ÒѾÓÐ8È˻ظ´
341Çóµ÷¼Á(Ò»Ö¾Ô¸ºþÄÏ´óѧ070300)
ÒѾÓÐ6È˻ظ´
Ðľ²_ÒÀÈ»
°æÖ÷ (ÖªÃû×÷¼Ò)
ÃüÖСù×¢¶¨
- LS-EPI: 198
- Ó¦Öú: 327 (´óѧÉú)
- ¹ó±ö: 2.396
- ½ð±Ò: 77406.9
- É¢½ð: 13395
- ºì»¨: 211
- ɳ·¢: 98
- Ìû×Ó: 8367
- ÔÚÏß: 2109.5Сʱ
- ³æºÅ: 3472728
- ×¢²á: 2014-10-13
- ÐÔ±ð: GG
- רҵ: ×ÊÔ´»¯¹¤
- ¹ÜϽ: ¼ìË÷֪ʶ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
gamefzx(oven1986´ú·¢): ½ð±Ò+10, ¸ÐлӦÖú£¡ 2015-01-02 20:31:16
oven1986: LS-EPI+1, ¸ÐлӦÖú£¡ 2015-01-02 20:31:29
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
gamefzx(oven1986´ú·¢): ½ð±Ò+10, ¸ÐлӦÖú£¡ 2015-01-02 20:31:16
oven1986: LS-EPI+1, ¸ÐлӦÖú£¡ 2015-01-02 20:31:29
|
¼ìË÷ÐÅÏ¢ÈçÏ Optimal pixel expansion of deterministic visual cryptography scheme ×÷Õß:Fu, ZX (Fu, Zhengxin)[ 1 ] ; Yu, B (Yu, Bin)[ 1 ] MULTIMEDIA TOOLS AND APPLICATIONS ¾í: 73 ÆÚ: 3 Ò³: 1177-1193 DOI: 10.1007/s11042-013-1625-3 ³ö°æÄê: DEC 2014 ²é¿´ÆÚ¿¯ÐÅÏ¢ ÕªÒª The optimal pixel expansion is an important parameter of deterministic visual cryptography scheme (DVCS). There are many researches have been done under different access structures and stacking operations. However, any necessary or sufficient condition has not been found about the optimal pixel expansion. In this paper, we give a necessary condition of the optimal pixel expansion of DVCS for the first time, which is suitable for any access structure and any stacking operation. Furthermore, a pixel expansion optimization algorithm has been designed to improve the existing schemes. It is found that the pixel expansion can be reduced for most DVCS based on XOR operation. Finally, we give some experimental results and comparisons to show the effectiveness of the proposed scheme. ¹Ø¼ü´Ê ×÷Õ߹ؼü´Ê:Visual cryptography; Deterministic; Necessary condition; Pixel expansion KeyWords Plus:SECRET SHARING SCHEMES; CONSTRUCTION ×÷ÕßÐÅÏ¢ ͨѶ×÷ÕßµØÖ·: Fu, ZX (ͨѶ×÷Õß) Zhengzhou Informat Sci & Technol Inst, Dept Comp Sci & Informat Engn, Zhengzhou, Peoples R China. µØÖ·: [ 1 ] Zhengzhou Informat Sci & Technol Inst, Dept Comp Sci & Informat Engn, Zhengzhou, Peoples R China µç×ÓÓʼþµØÖ·:fzx2515@163.com; byu2009@163.com »ù½ð×ÊÖúÖÂл »ù½ð×ÊÖú»ú¹¹ ÊÚȨºÅ National Natural Science Foundation of China 61070086 ²é¿´»ù½ð×ÊÖúÐÅÏ¢ ³ö°æÉÌ SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS Àà±ð / ·ÖÀà Ñо¿·½Ïò:Computer Science; Engineering Web of Science Àà±ð:Computer Science, Information Systems; Computer Science, Software Engineering; Computer Science, Theory & Methods; Engineering, Electrical & Electronic ÎÄÏ×ÐÅÏ¢ ÎÄÏ×ÀàÐÍ:Article ÓïÖÖ:English Èë²ØºÅ: WOS:000344744200006 ISSN: 1380-7501 eISSN: 1573-7721 ÆÚ¿¯ÐÅÏ¢ Impact Factor (Ó°ÏìÒò×Ó): Journal Citation Reports® ÆäËûÐÅÏ¢ IDS ºÅ: AT2EH Web of Science ºËÐĺϼ¯ÖÐµÄ "ÒýÓõIJο¼ÎÄÏ×": 26 Web of Science ºËÐĺϼ¯ÖÐµÄ "±»ÒýƵ´Î": 0 |

2Â¥2014-12-23 12:49:59
gamefzx
½ð³æ (ÕýʽдÊÖ)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 3078
- Ìû×Ó: 602
- ÔÚÏß: 155.4Сʱ
- ³æºÅ: 1174569
- ×¢²á: 2010-12-21
- ÐÔ±ð: GG
- רҵ: ÐÅÏ¢°²È«
3Â¥2014-12-23 13:03:05













»Ø¸´´ËÂ¥