Academic literature on the topic 'Visual cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Visual cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Visual cryptography"
Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Full textLakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.
Full textGopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.
Full textVenu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.
Full textPawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.
Full textShi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.
Full textShaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.
Full textZhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.
Full textRan-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.
Full textDissertations / Theses on the topic "Visual cryptography"
Muecke, Innes. "Greyscale and colour visual cryptography." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ48283.pdf.
Full textWeir, J. P. "Visual cryptography and its applications." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.557852.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textGhiotto, Nicolo' <1994>. "Visual Cryptography Schemes with Multiple Secrets and Visual Key Derivation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13323.
Full textMoretto, Tommaso <1992>. "Secure 2D barcodes based on visual cryptography." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13391.
Full textMacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.
Full textKoshta, Prashant Kumar, and Shailendra Singh Thakur. "A Novel Authenticity of an Image Using Visual Cryptography." IJCSN, 2012. http://hdl.handle.net/10150/219514.
Full textMaheshwari, Varun. "Data confidentiality and keyword search in the cloud using visual cryptography." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106553.
Full textLeung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.
Full textPotay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.
Full textBooks on the topic "Visual cryptography"
Yan, Bin, Yong Xiang, and Guang Hua. Improving Image Quality in Visual Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-8289-5.
Full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5.
Full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1.
Full textK, kokula Krishna Hari, ed. Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.
Find full textKUMAR, Pratheek PRAVEEN. Steganography Using Visual Cryptography. Independently Published, 2018.
Find full textKumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textBhagat, Ruchir Ruchir, Shiksha Shiksha Suvarna, and Pratheek Praveen Pratheek Praveen Kumar. Steganography Using Visual Cryptography. Independently Published, 2017.
Find full textKumar, Pratheek Praveen. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textKumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textKumar, Pratheek Praveen, Shiksha SUVARNA, and Ruchir BHAGAT. Steganography Using Visual Cryptography. Independently Published, 2018.
Find full textBook chapters on the topic "Visual cryptography"
D’Arco, Paolo, and Roberto De Prisco. "Visual Cryptography." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47238-6_2.
Full textOthman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_9077-2.
Full textNaor, Moni, and Adi Shamir. "Visual cryptography." In Advances in Cryptology — EUROCRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053419.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Visual Cryptography." In Cryptography and Cryptanalysis in MATLAB. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7334-0_12.
Full textOthman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics. Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_9077.
Full textBiehl, Ingrid, and Susanne Wetzel. "Traceable visual cryptography." In Information and Communications Security. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028462.
Full textFreeman, Adam. "Cryptography and Security." In Introducing Visual C# 2010. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3172-1_37.
Full textJones, Allen, and Adam Freeman. "Security and Cryptography." In Visual C# 2010 Recipes. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2526-3_11.
Full textLiu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5_3.
Full textLiu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1_4.
Full textConference papers on the topic "Visual cryptography"
Liu, Mengyao, and Peijun Zhao. "Quantum color visual cryptography scheme." In 2025 5th International Conference on Applied Mathematics, Modelling and Intelligent Computing (CAMMIC 2025), edited by Peicheng Zhu and Guihua Lin. SPIE, 2025. https://doi.org/10.1117/12.3070563.
Full textR, Rajesh, Aaditya Kannan, Adithya S. Nair, Adittya Narayan, Sarvesh M, and Varun Vetrivendan. "Secure Web Authentication Using Visual Cryptography." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894432.
Full textRaj, Manisha, Indu Bhardwaj, and Dinesh Singh. "Design and Implementation of Visual Cryptography scheme." In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT). IEEE, 2024. http://dx.doi.org/10.1109/iceect61758.2024.10739293.
Full textAXENTI, Ilie, and Olga CERBU. "Criptografia vizuală." In Materialele Conferinţei Ştiinţifice Internaţionale "Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM)". Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.steam-2024.p249-253.
Full textAshutosh and Sayan Dev Sen. "Visual Cryptography." In 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2008. http://dx.doi.org/10.1109/icacte.2008.184.
Full textHsu, Shuo-Fang, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, and Shih-Yu Huang. "Verifiable Visual Cryptography." In 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2012. http://dx.doi.org/10.1109/icgec.2012.150.
Full textGupta, Ankit, and Kshitiz Saxena. "Region incrementing visual cryptography." In 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom). IEEE, 2014. http://dx.doi.org/10.1109/medcom.2014.7006012.
Full textWang, Guangyu, Feng Liu, and Wei Qi Yan. "Braille for Visual Cryptography." In 2014 IEEE International Symposium on Multimedia (ISM). IEEE, 2014. http://dx.doi.org/10.1109/ism.2014.70.
Full textDu, Ruofei, Eric Lee, and Amitabh Varshney. "Tracking-Tolerant Visual Cryptography." In 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2019. http://dx.doi.org/10.1109/vr.2019.8797924.
Full textArce, Gonzalo R., Zhi Zhou, and Giovanni Di Crescenzo. "Visual cryptography via halftoning." In Electronic Imaging 2004, edited by Reiner Eschbach and Gabriel G. Marcu. SPIE, 2003. http://dx.doi.org/10.1117/12.532655.
Full text