Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Modern Digital HalftoningJanuary 2001
Publisher:
  • Marcel Dekker, Inc.
  • 270 Madison Ave. New York, NY
  • United States
ISBN:978-0-8247-0456-8
Published:01 January 2001
Pages:
431
Skip Bibliometrics Section
Reflects downloads up to 10 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Zhang F and Zhang X (2019). Image inverse halftoning and descreening: a review, Multimedia Tools and Applications, 78:15, (21021-21039), Online publication date: 1-Aug-2019.
  2. Yan B, Xiang Y and Hua G (2018). Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach, IEEE Transactions on Image Processing, 28:2, (896-911), Online publication date: 1-Feb-2019.
  3. ACM
    Fedoseev V Secure textural watermarking methods for printed document protection Proceedings of the International Conference on Watermarking and Image Processing, (27-31)
  4. Yan X, Wang S, El-Latif A and Niu X (2015). Random grids-based visual secret sharing with improved visual quality via error diffusion, Multimedia Tools and Applications, 74:21, (9279-9296), Online publication date: 1-Nov-2015.
  5. ACM
    Brunton A, Arikan C and Urban P (2015). Pushing the Limits of 3D Color Printing, ACM Transactions on Graphics, 35:1, (1-13), Online publication date: 29-Dec-2016.
  6. Guo T, Liu F and Wu C (2014). k out of k extended visual cryptography scheme by random grids, Signal Processing, 94, (90-101), Online publication date: 1-Jan-2014.
  7. ACM
    Weir J, Yan W and Kankanhalli M (2012). Image hatching for visual cryptography, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 8:2S, (1-15), Online publication date: 1-Sep-2012.
  8. Halder B, Garain U, Darbar R and Mondal A Inverse of Low Resolution Line Halftone Images for Document Inspection Computational Forensics, (95-103)
  9. Barrera I, Arce G and Bohacek S (2011). Statistical approach for congestion control in gateway routers, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:3, (572-582), Online publication date: 1-Feb-2011.
  10. Fung Y and Chan Y (2010). Green noise digital halftoning with multiscale error diffusion, IEEE Transactions on Image Processing, 19:7, (1808-1823), Online publication date: 1-Jul-2010.
  11. Weir J and Yan W A comprehensive study of visual cryptography Transactions on data hiding and multimedia security V, (70-105)
  12. Weir J and Yan W Secure masks for visual cryptography Transactions on data hiding and multimedia security V, (106-128)
  13. Guo J and Lin C Parallel and element-reduced error-diffused block truncation coding Proceedings of the 16th IEEE international conference on Image processing, (1885-1888)
  14. Wang Z, Arce G and Di Crescenzo G (2009). Halftone visual cryptography via error diffusion, IEEE Transactions on Information Forensics and Security, 4:3, (383-396), Online publication date: 1-Sep-2009.
  15. Guo J and Liu Y (2019). Improved dot diffusion by diffused matrix and class matrix co-optimization, IEEE Transactions on Image Processing, 18:8, (1804-1816), Online publication date: 1-Aug-2009.
  16. Lee J and Horiuchi T (2008). Image Quality Assessment for Color Halftone Images Based on Color Structural Similarity, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:6, (1392-1399), Online publication date: 1-Jun-2008.
  17. Hsu C, Lu C and Pei S Joint screening halftoning and visual cryptography for image protection Proceedings of the 5th international conference on Digital Watermarking, (212-225)
  18. Asano T, Katoh N, Obokata K and Tokuyama T Combinatorial and geometric problems related to digital halftoning Proceedings of the 11th international conference on Theoretical foundations of computer vision, (58-71)
Contributors
  • University of Kentucky
  • University of Delaware

Recommendations