Chuan Kun Wu

According to our database1, Chuan Kun Wu authored at least 28 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Boolean Functions and Their Applications in Cryptography
Advances in Computer Science and Technology, Springer, ISBN: 978-3-662-48865-2, 2016

2014
ESSVCS: An Enriched Secret Sharing Visual Cryptography.
Trans. Data Hiding Multim. Secur., 2014

Flexible Visual Cryptography Scheme and Its Application.
Trans. Data Hiding Multim. Secur., 2014

k out of k extended visual cryptography scheme by random grids.
Signal Process., 2014

2013
Threshold visual secret sharing by random grids with improved contrast.
J. Syst. Softw., 2013

Threshold Secret Image Sharing.
IACR Cryptol. ePrint Arch., 2013

The Security Defect of a Multi-pixel Encoding Method.
Proceedings of the Information Security, 16th International Conference, 2013

On the Randomness of Visual Cryptography Scheme.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

On (k, n) Visual Cryptography Scheme with t Essential Parties.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

2012
Improving the visual quality of size invariant visual cryptography scheme.
J. Vis. Commun. Image Represent., 2012

Using Variance to Analyze Visual Cryptography Schemes.
IACR Cryptol. ePrint Arch., 2012

A Secret Enriched Visual Cryptography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

On the Equivalence of Two Definitions of Visual Cryptography Scheme.
Proceedings of the Information Security Practice and Experience, 2012

Visual Cryptography for Natural Images and Visual Voting.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Cheating immune visual cryptography scheme.
IET Inf. Secur., 2011

Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners.
IET Inf. Secur., 2011

Encrypting More Information in Visual Cryptography Scheme.
IACR Cryptol. ePrint Arch., 2011

Flexible Visual Cryptography Scheme without Distortion.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Multi-pixel Encryption Visual Cryptography.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Step construction of visual cryptography schemes.
IEEE Trans. Inf. Forensics Secur., 2010

A new definition of the contrast of visual cryptography scheme.
Inf. Process. Lett., 2010

Optimal XOR based (2, n)-Visual Cryptography Schemes.
IACR Cryptol. ePrint Arch., 2010

Linear Approximations of Addition Modulo 2<sup>n</sup>-1.
IACR Cryptol. ePrint Arch., 2010

Some Extensions on Threshold Visual Cryptography Schemes.
Comput. J., 2010

2009
The alignment problem of visual cryptography schemes.
Des. Codes Cryptogr., 2009

2008
Many-to-one encryption and authentication scheme and its application.
J. Commun. Networks, 2008

Colour visual cryptography schemes.
IET Inf. Secur., 2008

Analysis of an authenticated identity-based multicast scheme.
IET Commun., 2008


  Loading...