Follow
Feng Liu
Title
Cited by
Cited by
Year
Embedded extended visual cryptography schemes
F Liu, C Wu
IEEE transactions on information forensics and security 6 (2), 307-322, 2011
2112011
Colour visual cryptography schemes
F Liu, CK Wu, XJ Lin
IET Information Security 2 (4), 151-165, 2008
1582008
Step construction of visual cryptography schemes
F Liu, C Wu, X Lin
IEEE transactions on information forensics and security 5 (1), 27-38, 2009
1332009
Threshold visual secret sharing by random grids with improved contrast
T Guo, F Liu, CK Wu
Journal of Systems and Software 86 (8), 2094-2109, 2013
962013
Improving the visual quality of size invariant visual cryptography scheme
F Liu, CK Wu, L Qian
Journal of Visual Communication and Image Representation 23 (2), 331-342, 2012
782012
Cheating immune visual cryptography scheme
F Liu, C Wu, X Lin
IET Information Security 5 (1), 51-59, 2011
522011
Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners
F Liu, CK Wu
IET Information Security 5 (2), 121-128, 2011
512011
Visual cryptography for image processing and security
F Liu, WQ Yan
Springer International publishing, 2014
492014
A new definition of the contrast of visual cryptography scheme
F Liu, CK Wu, XJ Lin
Information Processing Letters 110 (7), 241-246, 2010
422010
Basic visual cryptography using braille
G Wang, F Liu, WQ Yan
International Journal of Digital Crime and Forensics (IJDCF) 8 (3), 85-93, 2016
362016
2D barcodes for visual cryptography
G Wang, F Liu, WQ Yan
Multimedia tools and applications 75 (2), 1223-1241, 2016
332016
K out of k extended visual cryptography scheme by random grids
T Guo, F Liu, CK Wu
Signal Processing 94, 90-101, 2014
322014
Some extensions on threshold visual cryptography schemes
F Liu, CK Wu, XJ Lin
The Computer Journal 53 (1), 107-119, 2010
302010
Cheating prevention visual cryptography scheme using Latin square
Y Ren, F Liu, T Guo, R Feng, D Lin
IET Information Security 11 (4), 211-219, 2017
252017
Optimal XOR based (2, n)-visual cryptography schemes
F Liu, CK Wu
International workshop on digital watermarking, 333-349, 2014
242014
On Visual Cryptography Scheme with Essential Parties
T Guo, F Liu, CK Wu, YW Ren, W Wang
Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014
232014
Various problems in visual cryptography
F Liu, WQ Yan, F Liu, WQ Yan
Visual Cryptography for Image Processing and Security: Theory, Methods, and …, 2014
142014
A practical application of Driscoll's equation for predicting the acid-neutralizing capacity in acidic natural waters equilibria with the mineral phase gibbsite
SP Bi, SQ An, F Liu
Environment international 26 (5-6), 327-333, 2001
142001
Threshold secret image sharing
T Guo, F Liu, CK Wu, CN Yang, W Wang, YW Ren
International Conference on Information and Communications Security, 404-412, 2013
112013
HSLF: HTTP header sequence based LSH fingerprints for application traffic classification
Z Tang, Q Wang, W Li, H Bao, F Liu, W Wang
International Conference on Computational Science, 41-54, 2021
102021
The system can't perform the operation now. Try again later.
Articles 1–20