References
1. Bayers B E. An optimum method for two level rendition of continuous tone pictures. IEEE International Communication Conference, 1973: 2611 -2615
2. Ulichney R A. The void-and-cluster method for dither array generation. Proceedings of SPIE - The International Society for Optical Engineering, 1993: 332 -343
3. Jarvis J F, Judice C N, Ninke W H. A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics and Image Processing, 1976, 5(1): 13 -40
4. Stucki P. MECCA-a multiple-error correcting computation algorithm or bilevel image hardcopy reproduction. IBM Research Laboratory, Zurich, Switzerland, Research Report. RZ1060, 1981
5. Floyd R W, Steinberg L. An adaptive algorithm for spatial grayscale. Proc Sid International Symposium Digest of Technical Papers, 1975: 36 -37
6. Knuth D E. Digital halftones by dot diffusion. ACM Transactions on Graphics, 1987, 6(4): 245 -273
7. Mese M, Vaidyanathan P P. Optimized halftoning using dot diffusion and methods for inverse halftoning. IEEE Transactions on Image Processing, 2000, 9(4): 691 -709
8. Analoui M, Allebach J P. Model based halftoning using direct binary search. Proceedings of SPIE Human Vision, Visual Processing, and Digital Display III, 1992, 666: 96 -108
9. Lieberman D J, Allebach J P. Efficient model based halftoning using direct binary search. IEEE International Conference on Image Processing, 1997: 755 -778
10. Naor M, Shamir A. Visual cryptography. Workshop on the theory and application of cryptographic techniques. EUROCRYPT 1994. Italy: Springer, 1995: 1 -12
11. Ateniese G, Blundo C, Santis A, et al. Extended capabilities for visual cryptography. Theoretical Computer Science, 2001, 250(1 - 2): 143 -161
12. Kafri O, Keren E. Encryption of pictures and shapes by random grids. Optics Letters, 1987, 12(6): 377 -379
13. Chen T, Tsao K. Visual secret sharing by random grids revisited. Pattern Recognition, 2009, 42(9): 2203 -2217
14. Chen T, Tsao K. Threshold visual secret sharing by random grids. Journal of Systems and Software, 2011, 84(7): 1197 -1208
15. Ou D, Wu X, Dai L, et al. Improved tagged visual cryptograms by using random grids. Lecture Notes in Computer Science, 2014, 8389: 79 -94
16. Hou Y C, Quan Z Y, Tsai C F, et al. Block-based progressive visual secret sharing. Information Sciences, 2013, 233 ( 2 ): 290 -304
17. Yang C N, Lin Y C, Wu C C. Cheating immune block-based progressive visual cryptography. Lecture Notes in Computer Science, 2014, 8389: 95 -108
18. Wang Z M, Arce G R, Crescenzo G D. Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 383 -396
19. Yan X H, Wang S, Niu X M, et al. Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Signal Processing: A Review Journal, 2015, 38: 53 -65
20. Guo Y F, Au O C, Tang K, et al. Data hiding in dot diffused halftone images. IEEE International Conference on Multimedia and Expo, 2011: 1 -6
21. Guo Y F, Au O C, Tang K, et al. Hiding a secret pattern into color halftone images. Lecture Notes in Computer Science, 2014, 8389: 465 -474
22. Ding H Y, Yang Y X. Data hiding in color halftone images based on new conjugate property. Computers and Electrical Engineering. Publish online: 1 July 2016: 1 -15
23. Ding H Y. Realization and extension of data hiding methods in gary-scale halftone images. 2016 International Conference on Applied Mechanics, Electronics and Mechatronics Engineering, 2016: 65 -70
24. Wu X T, Sun W. Visual data hiding in dot diffusion images. 5th International Conference on Computer Sciences and Convergence Information Technology, 2011: 588 -593
25. Chen Y Y, Chen W S. High-quality blind watermarking in halftones using random toggle approach. Multimedia Tools Application. Publish online: 4 April 2017: 1 -23
26. Shen G, Liu F, Fu Z X, et al. Halftone visual cryptography with complementary cover images. Lecture Notes in Computer Science, 2017, 10082: 223 -237
27. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612 -613 |