Embedded extended visual cryptography schemes F Liu, C Wu
IEEE transactions on information forensics and security 6 (2), 307-322, 2011
212 2011 Colour visual cryptography schemes F Liu, CK Wu, XJ Lin
IET Information Security 2 (4), 151-165, 2008
158 2008 Step construction of visual cryptography schemes F Liu, C Wu, X Lin
IEEE transactions on information forensics and security 5 (1), 27-38, 2009
136 2009 Threshold visual secret sharing by random grids with improved contrast T Guo, F Liu, CK Wu
Journal of Systems and Software 86 (8), 2094-2109, 2013
97 2013 Improving the visual quality of size invariant visual cryptography scheme F Liu, CK Wu, L Qian
Journal of Visual Communication and Image Representation 23 (2), 331-342, 2012
79 2012 Cheating immune visual cryptography scheme F Liu, C Wu, X Lin
IET Information Security 5 (1), 51-59, 2011
53 2011 Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners F Liu, CK Wu
IET Information Security 5 (2), 121-128, 2011
51 2011 Visual cryptography for image processing and security F Liu, WQ Yan
Springer International publishing, 2014
49 2014 A new definition of the contrast of visual cryptography scheme F Liu, CK Wu, XJ Lin
Information Processing Letters 110 (7), 241-246, 2010
44 2010 Basic visual cryptography using braille G Wang, F Liu, WQ Yan
International Journal of Digital Crime and Forensics (IJDCF) 8 (3), 85-93, 2016
36 2016 2D barcodes for visual cryptography G Wang, F Liu, WQ Yan
Multimedia tools and applications 75 (2), 1223-1241, 2016
33 2016 K out of k extended visual cryptography scheme by random grids T Guo, F Liu, CK Wu
Signal Processing 94, 90-101, 2014
32 2014 Some extensions on threshold visual cryptography schemes F Liu, CK Wu, XJ Lin
The Computer Journal 53 (1), 107-119, 2010
30 2010 Cheating prevention visual cryptography scheme using Latin square Y Ren, F Liu, T Guo, R Feng, D Lin
IET Information Security 11 (4), 211-219, 2017
26 2017 Optimal XOR based (2, n)-visual cryptography schemes F Liu, CK Wu
International workshop on digital watermarking, 333-349, 2014
24 2014 On Visual Cryptography Scheme with Essential Parties T Guo, F Liu, CK Wu, YW Ren, W Wang
Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014
23 2014 Various problems in visual cryptography F Liu, WQ Yan, F Liu, WQ Yan
Visual Cryptography for Image Processing and Security: Theory, Methods, and …, 2014
14 2014 A practical application of Driscoll's equation for predicting the acid-neutralizing capacity in acidic natural waters equilibria with the mineral phase gibbsite SP Bi, SQ An, F Liu
Environment international 26 (5-6), 327-333, 2001
14 2001 Threshold secret image sharing T Guo, F Liu, CK Wu, CN Yang, W Wang, YW Ren
International Conference on Information and Communications Security, 404-412, 2013
11 2013 A lightweight DDoS detection scheme under SDN context K Jia, C Liu, Q Liu, J Wang, J Liu, F Liu
Cybersecurity 5 (1), 27, 2022
10 2022