Search Results for author: Yishi Shi

Found 2 papers, 0 papers with code

Realization Scheme for Visual Cryptography with Computer-generated Holograms

no code implementations10 Dec 2022 Tao Yu, Jinge Ma, Guilin Li, Dongyu Yang, Rui Ma, Yishi Shi

This method can expand the application range of visual cryptography and further increase the security of visual cryptography.

Review on Optical Image Hiding and Watermarking Techniques

no code implementations16 Apr 2018 Shuming Jiao, Changyuan Zhou, Yishi Shi, Wenbin Zou, Xia Li

Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access.

Cannot find the paper you are looking for? You can Submit a new open access paper.