Cheating in visual cryptography G Horng, T Chen, DS Tsai Designs, Codes and Cryptography 38, 219-236, 2006 | 214 | 2006 |
A cheating prevention scheme for binary visual cryptography with homogeneous secret images DS Tsai, TH Chen, G Horng Pattern Recognition 40 (8), 2356-2366, 2007 | 105 | 2007 |
A novel secret image sharing scheme for true-color images with size constraint DS Tsai, G Horng, TH Chen, YT Huang Information Sciences 179 (19), 3247-3254, 2009 | 102 | 2009 |
Reversible data hiding scheme based on neighboring pixel differences YY Tsai, DS Tsai, CL Liu Digital Signal Processing 23 (3), 919-927, 2013 | 83 | 2013 |
Comment on “cheating prevention in visual cryptography” YC Chen, G Horng, DS Tsai IEEE transactions on image processing 21 (7), 3319-3323, 2012 | 75 | 2012 |
A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography YC Chen, DS Tsai, G Horng Journal of Visual Communication and Image Representation 23 (8), 1225-1233, 2012 | 60 | 2012 |
Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol TH Chen, DS Tsai Pattern Recognition 39 (8), 1530-1541, 2006 | 58 | 2006 |
On generating meaningful shares in visual secret sharing scheme DS Tsai, T Chen, G Horng The Imaging Science Journal 56 (1), 49-55, 2008 | 48 | 2008 |
Visual secret sharing with cheating prevention revisited YC Chen, DS Tsai, G Horng Digital Signal Processing 23 (5), 1496-1504, 2013 | 28 | 2013 |
A fast VQ codebook generation algorithm based on OTSU histogram threshold CC Huang, DS Tsai, G Horng Fundamenta Informaticae 91 (3-4), 563-579, 2009 | 10 | 2009 |
Cheating prevention in visual cryptography YC Chen, G Horng, DS Tsai Visual cryptography and secret image sharing 201, 2011 | 7 | 2011 |
An anonymous buyer‐reseller watermarking protocol TH Chen, G Horng, D Tsai Journal of the Chinese institute of engineers 28 (3), 535-538, 2005 | 7 | 2005 |
Visibility bounds for visual secret sharing based on JND theory DS Tsai, YC Chen Multimedia tools and applications 70, 1825-1836, 2014 | 4 | 2014 |
Efficient Vector Quantization codebook generation based on Histogram Thresholding algorithm CC Huang, DS Tsai, G Horng 2008 International Conference on Intelligent Information Hiding and …, 2008 | 4 | 2008 |
On the Security of a Cheating Immune Visual Secret Sharing Scheme. YC Chen, DS Tsai, G Horng IACR Cryptol. ePrint Arch. 2011, 631, 2011 | 2 | 2011 |
Cheating human vision in visual secret sharing YC Chen, G Horng, DS Tsai Cryptology ePrint Archive, 2011 | 2 | 2011 |
A new deterministic algorithm based cheating prevention scheme for Visual Cryptography DS Tsai, CC Huang 修 平 學 報, 147, 2010 | 2 | 2010 |
Speeding up Pairing Computation Using Non-adjacent Form and ELM Method. CL Liu, G Horng, DS Tsai Int. J. Netw. Secur. 18 (1), 108-115, 2016 | 1 | 2016 |
Share Authentication based Cheating Prevention in Naor-Shamir’s Visual Cryptography YC Chen, G Horng, DS Tsai Journal of Computers 21 (1), 2011 | 1 | 2011 |
On Visual False Positive Secret in 2-out-of-n Visual Cryptography DS Tsai 修平學報, 41-54, 2013 | | 2013 |