BibTeX records: Zhengxin Fu

download as .bib file

@article{DBLP:journals/jvcir/FuFHY22,
  author       = {Zhengxin Fu and
                  Liguo Fang and
                  Hangying Huang and
                  Bin Yu},
  title        = {Distributed three-level {QR} codes based on visual cryptography scheme},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {87},
  pages        = {103567},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jvcir.2022.103567},
  doi          = {10.1016/J.JVCIR.2022.103567},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/FuFHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuangFY21,
  author       = {Hangying Huang and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel
                  Encoding},
  booktitle    = {17th International Conference on Computational Intelligence and Security
                  {CIS} 2021, Chengdu, China, November 19-22, 2021},
  pages        = {459--463},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CIS54983.2021.00101},
  doi          = {10.1109/CIS54983.2021.00101},
  timestamp    = {Wed, 16 Feb 2022 17:26:48 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuangFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunFY20,
  author       = {Rui Sun and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Size-Invariant Visual Cryptography With Improved Perceptual Quality
                  for Grayscale Image},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {163394--163404},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3021522},
  doi          = {10.1109/ACCESS.2020.3021522},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunFY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/FangFYZ20,
  author       = {Liguo Fang and
                  Zhengxin Fu and
                  Cheng Yi and
                  Yong Zhang},
  title        = {A map traceability management scheme for security control},
  journal      = {Enterp. Inf. Syst.},
  volume       = {14},
  number       = {3},
  pages        = {388--401},
  year         = {2020},
  url          = {https://doi.org/10.1080/17517575.2019.1669830},
  doi          = {10.1080/17517575.2019.1669830},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/FangFYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FuLSFY20,
  author       = {Zhengxin Fu and
                  Sijia Liu and
                  Rui Sun and
                  Liguo Fang and
                  Bin Yu},
  title        = {Distributed color {QR} code with high-capability and fast decoding},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {43-44},
  pages        = {32471--32485},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09469-2},
  doi          = {10.1007/S11042-020-09469-2},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/FuLSFY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aipr2/SunF0H20,
  author       = {Rui Sun and
                  Zhengxin Fu and
                  Bin Yu and
                  Hangying Huang},
  title        = {A Novel Color Multi-Secret Visual Cryptography Scheme},
  booktitle    = {{AIPR} 2020: 3rd International Conference on Artificial Intelligence
                  and Pattern Recognition, Xiamen, China, June 26-28, 2020},
  pages        = {140--144},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3430199.3430235},
  doi          = {10.1145/3430199.3430235},
  timestamp    = {Wed, 20 Jan 2021 15:11:55 +0100},
  biburl       = {https://dblp.org/rec/conf/aipr2/SunF0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuFY19a,
  author       = {Sijia Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Rich {QR} Codes With Three-Layer Information Using Hamming Code},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {78640--78651},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2922259},
  doi          = {10.1109/ACCESS.2019.2922259},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuFY19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChengFYS19,
  author       = {Yuqiao Cheng and
                  Zhengxin Fu and
                  Bin Yu and
                  Gang Shen},
  title        = {General Construction for Extended Visual Cryptography Scheme Using
                  {QR} Codes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {1--17},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010101},
  doi          = {10.4018/IJDCF.2019010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChengFYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FuCY19,
  author       = {Zhengxin Fu and
                  Yuqiao Cheng and
                  Bin Yu},
  title        = {Perfect recovery of XOR-based visual cryptography scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {2},
  pages        = {2367--2384},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6364-z},
  doi          = {10.1007/S11042-018-6364-Z},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FuCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/0005SLF019,
  author       = {Hao Hu and
                  Gang Shen and
                  Yuling Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Improved schemes for visual secret sharing based on random grids},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {9},
  pages        = {12055--12082},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6738-2},
  doi          = {10.1007/S11042-018-6738-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/0005SLF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FuCY19a,
  author       = {Zhengxin Fu and
                  Yuqiao Cheng and
                  Bin Yu},
  title        = {Rich {QR} code with three-layer information using visual secret sharing
                  scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {14},
  pages        = {19861--19875},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7333-x},
  doi          = {10.1007/S11042-019-7333-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FuCY19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuFY19,
  author       = {Sijia Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {A two-level {QR} code scheme based on polynomial secret sharing},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {15},
  pages        = {21291--21308},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7455-1},
  doi          = {10.1007/S11042-019-7455-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuFY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuFL19,
  author       = {Bin Yu and
                  Zhengxin Fu and
                  Sijia Liu},
  title        = {A Novel Three-Layer {QR} Code Based on Secret Sharing Scheme and Liner
                  Code},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7937816:1--7937816:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7937816},
  doi          = {10.1155/2019/7937816},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FuCY18,
  author       = {Zhengxin Fu and
                  Yuqiao Cheng and
                  Bin Yu},
  title        = {Visual Cryptography Scheme With Meaningful Shares Based on {QR} Codes},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {59567--59574},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2874527},
  doi          = {10.1109/ACCESS.2018.2874527},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/FuCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuSFY18,
  author       = {Hao Hu and
                  Gang Shen and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Improved Contrast for Threshold Random-grid-based Visual Cryptography},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {7},
  pages        = {3401--3420},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.07.022},
  doi          = {10.3837/TIIS.2018.07.022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/HuSFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShenLFY18,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Visual cryptograms of random grids via linear algebra},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {10},
  pages        = {12871--12899},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4921-5},
  doi          = {10.1007/S11042-017-4921-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShenLFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChengFYS18,
  author       = {Yuqiao Cheng and
                  Zhengxin Fu and
                  Bin Yu and
                  Gang Shen},
  title        = {A new two-level {QR} code with visual cryptography scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {16},
  pages        = {20629--20649},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5465-4},
  doi          = {10.1007/S11042-017-5465-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChengFYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengFY18,
  author       = {Yuqiao Cheng and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Improved Visual Secret Sharing Scheme for {QR} Code Applications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2393--2403},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819125},
  doi          = {10.1109/TIFS.2018.2819125},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FuLXY18,
  author       = {Zhengxin Fu and
                  Sijia Liu and
                  Kun Xia and
                  Bin Yu},
  title        = {Improved Extended Polynomial-Based Secret Image Sharing Scheme Using
                  {QR} Code},
  booktitle    = {14th International Conference on Computational Intelligence and Security,
                  {CIS} 2018, Hangzhou, China, November 16-19, 2018},
  pages        = {233--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIS2018.2018.00058},
  doi          = {10.1109/CIS2018.2018.00058},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FuLXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShenLFY17,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Perfect contrast XOR-based visual cryptography schemes via linear
                  algebra},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {15--37},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0285-5},
  doi          = {10.1007/S10623-016-0285-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShenLFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShenLFY17,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {New insight into linear algebraic technique to construct visual cryptography
                  scheme for general access structure},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {12},
  pages        = {14511--14533},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3867-3},
  doi          = {10.1007/S11042-016-3867-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShenLFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuSFYW16,
  author       = {Hao Hu and
                  Gang Shen and
                  Zhengxin Fu and
                  Bin Yu and
                  Jingjing Wang},
  title        = {General construction for XOR-based visual cryptography and its extended
                  capability},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13883--13911},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-016-3250-4},
  doi          = {10.1007/S11042-016-3250-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HuSFYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShenLFYW16,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu and
                  Wen Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Halftone Visual Cryptography with Complementary Cover Images},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {223--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_17},
  doi          = {10.1007/978-3-319-53465-7\_17},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShenLFYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FuY14,
  author       = {Zhengxin Fu and
                  Bin Yu},
  title        = {Optimal pixel expansion of deterministic visual cryptography scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {73},
  number       = {3},
  pages        = {1177--1193},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1625-3},
  doi          = {10.1007/S11042-013-1625-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FuY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/FuY14,
  author       = {Zhengxin Fu and
                  Bin Yu},
  title        = {Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {42--56},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_3},
  doi          = {10.1007/978-3-642-55046-1\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/FuY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuY13,
  author       = {Zhengxin Fu and
                  Bin Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Visual Cryptography and Random Grids Schemes},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {109--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_8},
  doi          = {10.1007/978-3-662-43886-2\_8},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuY12,
  author       = {Zhengxin Fu and
                  Bin Yu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {On the Security of Multi-secret Visual Cryptography Scheme with Ring
                  Shares},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {485--494},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_39},
  doi          = {10.1007/978-3-642-40099-5\_39},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YuFF08,
  author       = {Bin Yu and
                  Zhengxin Fu and
                  Liguo Fang},
  title        = {A Modified Multi-Secret Sharing Visual Cryptography Scheme},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop
                  Papers},
  pages        = {351--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.120},
  doi          = {10.1109/CIS.2008.120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YuFF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics