Abstract
No abstract available.
Cited By
- Zhang F and Zhang X (2019). Image inverse halftoning and descreening: a review, Multimedia Tools and Applications, 78:15, (21021-21039), Online publication date: 1-Aug-2019.
- Yan B, Xiang Y and Hua G (2018). Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach, IEEE Transactions on Image Processing, 28:2, (896-911), Online publication date: 1-Feb-2019.
- Fedoseev V Secure textural watermarking methods for printed document protection Proceedings of the International Conference on Watermarking and Image Processing, (27-31)
- Yan X, Wang S, El-Latif A and Niu X (2015). Random grids-based visual secret sharing with improved visual quality via error diffusion, Multimedia Tools and Applications, 74:21, (9279-9296), Online publication date: 1-Nov-2015.
- Brunton A, Arikan C and Urban P (2015). Pushing the Limits of 3D Color Printing, ACM Transactions on Graphics, 35:1, (1-13), Online publication date: 29-Dec-2016.
- Guo T, Liu F and Wu C (2014). k out of k extended visual cryptography scheme by random grids, Signal Processing, 94, (90-101), Online publication date: 1-Jan-2014.
- Weir J, Yan W and Kankanhalli M (2012). Image hatching for visual cryptography, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 8:2S, (1-15), Online publication date: 1-Sep-2012.
- Halder B, Garain U, Darbar R and Mondal A Inverse of Low Resolution Line Halftone Images for Document Inspection Computational Forensics, (95-103)
- Barrera I, Arce G and Bohacek S (2011). Statistical approach for congestion control in gateway routers, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:3, (572-582), Online publication date: 1-Feb-2011.
- Fung Y and Chan Y (2010). Green noise digital halftoning with multiscale error diffusion, IEEE Transactions on Image Processing, 19:7, (1808-1823), Online publication date: 1-Jul-2010.
- Weir J and Yan W A comprehensive study of visual cryptography Transactions on data hiding and multimedia security V, (70-105)
- Weir J and Yan W Secure masks for visual cryptography Transactions on data hiding and multimedia security V, (106-128)
- Guo J and Lin C Parallel and element-reduced error-diffused block truncation coding Proceedings of the 16th IEEE international conference on Image processing, (1885-1888)
- Wang Z, Arce G and Di Crescenzo G (2009). Halftone visual cryptography via error diffusion, IEEE Transactions on Information Forensics and Security, 4:3, (383-396), Online publication date: 1-Sep-2009.
- Guo J and Liu Y (2019). Improved dot diffusion by diffused matrix and class matrix co-optimization, IEEE Transactions on Image Processing, 18:8, (1804-1816), Online publication date: 1-Aug-2009.
- Lee J and Horiuchi T (2008). Image Quality Assessment for Color Halftone Images Based on Color Structural Similarity, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:6, (1392-1399), Online publication date: 1-Jun-2008.
- Hsu C, Lu C and Pei S Joint screening halftoning and visual cryptography for image protection Proceedings of the 5th international conference on Digital Watermarking, (212-225)
- Asano T, Katoh N, Obokata K and Tokuyama T Combinatorial and geometric problems related to digital halftoning Proceedings of the 11th international conference on Theoretical foundations of computer vision, (58-71)
Recommendations
Digital halftoning of images
Most printers and some display devices are bilevel (black or white) and therefore not capable of reproducing continuous tone pictures. Digital halftoning algorithms transform digital gray scale images into bilevel ones which give the appearance of ...