Embedded extended visual cryptography schemes F Liu, C Wu IEEE transactions on information forensics and security 6 (2), 307-322, 2011 | 215 | 2011 |
Colour visual cryptography schemes F Liu, CK Wu, XJ Lin IET Information Security 2 (4), 151-165, 2008 | 157 | 2008 |
Step construction of visual cryptography schemes F Liu, C Wu, X Lin IEEE transactions on information forensics and security 5 (1), 27-38, 2009 | 137 | 2009 |
Threshold visual secret sharing by random grids with improved contrast T Guo, F Liu, CK Wu Journal of Systems and Software 86 (8), 2094-2109, 2013 | 101 | 2013 |
Improving the visual quality of size invariant visual cryptography scheme F Liu, CK Wu, L Qian Journal of Visual Communication and Image Representation 23 (2), 331-342, 2012 | 82 | 2012 |
Cheating immune visual cryptography scheme F Liu, C Wu, X Lin IET Information Security 5 (1), 51-59, 2011 | 53 | 2011 |
Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners F Liu, CK Wu IET Information Security 5 (2), 121-128, 2011 | 52 | 2011 |
Visual cryptography for image processing and security F Liu, WQ Yan Springer International publishing, 2014 | 48 | 2014 |
A new definition of the contrast of visual cryptography scheme F Liu, CK Wu, XJ Lin Information Processing Letters 110 (7), 241-246, 2010 | 45 | 2010 |
Basic visual cryptography using braille G Wang, F Liu, WQ Yan International Journal of Digital Crime and Forensics (IJDCF) 8 (3), 85-93, 2016 | 36 | 2016 |
2D barcodes for visual cryptography G Wang, F Liu, WQ Yan Multimedia tools and applications 75 (2), 1223-1241, 2016 | 35 | 2016 |
K out of k extended visual cryptography scheme by random grids T Guo, F Liu, CK Wu Signal Processing 94, 90-101, 2014 | 32 | 2014 |
Some extensions on threshold visual cryptography schemes F Liu, CK Wu, XJ Lin The Computer Journal 53 (1), 107-119, 2010 | 30 | 2010 |
Cheating prevention visual cryptography scheme using Latin square Y Ren, F Liu, T Guo, R Feng, D Lin IET Information Security 11 (4), 211-219, 2017 | 29 | 2017 |
Optimal XOR based (2, n)-visual cryptography schemes F Liu, CK Wu International workshop on digital watermarking, 333-349, 2014 | 24 | 2014 |
On Visual Cryptography Scheme with Essential Parties T Guo, F Liu, CK Wu, YW Ren, W Wang Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014 | 24 | 2014 |
Various problems in visual cryptography F Liu, WQ Yan, F Liu, WQ Yan Visual Cryptography for Image Processing and Security: Theory, Methods, and …, 2014 | 16 | 2014 |
Bitcoin address clustering based on change address improvement F Liu, Z Li, K Jia, P Xiang, A Zhou, J Qi, Z Li IEEE Transactions on Computational Social Systems, 2023 | 15 | 2023 |
A practical application of Driscoll's equation for predicting the acid-neutralizing capacity in acidic natural waters equilibria with the mineral phase gibbsite SP Bi, SQ An, F Liu Environment international 26 (5-6), 327-333, 2001 | 15 | 2001 |
A lightweight DDoS detection scheme under SDN context K Jia, C Liu, Q Liu, J Wang, J Liu, F Liu Cybersecurity 5 (1), 27, 2022 | 12 | 2022 |