To see the other types of publications on this topic, follow the link: Visual cryptography.

Books on the topic 'Visual cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 books for your research on the topic 'Visual cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Yan, Bin, Yong Xiang, and Guang Hua. Improving Image Quality in Visual Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-8289-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

K, kokula Krishna Hari, ed. Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

KUMAR, Pratheek PRAVEEN. Steganography Using Visual Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhagat, Ruchir Ruchir, Shiksha Shiksha Suvarna, and Pratheek Praveen Pratheek Praveen Kumar. Steganography Using Visual Cryptography. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Pratheek Praveen. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Pratheek Praveen, Shiksha SUVARNA, and Ruchir BHAGAT. Steganography Using Visual Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Visual Cryptography and Its Applications. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Visual Cryptography and Its Applications. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Visual Cryptography and Its Applications. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Visual Cryptography and Its Applications. Bookboon, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Visual Cryptography and Its Applications. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Cimato, Stelvio. Visual Cryptography and Secret Image Sharing. CRC Press, 2011. http://dx.doi.org/10.1201/b11068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hua, Guang, Yong Xiang, and Bin Yan. Improving Image Quality in Visual Cryptography. Springer Singapore Pte. Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hua, Guang, Yong Xiang, and Bin Yan. Improving Image Quality in Visual Cryptography. Springer Singapore Pte. Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Visual cryptography and secret image sharing. Taylor & Francis, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer London, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cryptography for Visual Basic: A programmer's guide to the Microsoft CryptoAPI. John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shi, Yun Q., Feng Liu, and Weiqi Yan. Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Fachmedien Wiesbaden GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shi, Yun Q., Feng Liu, and Weiqi Yan. Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bondi, Richard. Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI. John Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Pape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Du bon usage des images: Autour des codes visuels en Chine et au Japon = About images and visual codes in China and Japan. Presses universitaires de Vincennes, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Basu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Basu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Basu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rawlinson, Jules. A Requiem for Edward Snowden. University of Edinburgh, 2024. http://dx.doi.org/10.2218/ed.9781836450566.

Full text
Abstract:
A Requiem for Edward Snowden is a 50-minute audio-visual work by Matthew Collings and Jules Rawlinson which addresses surveillance, data privacy, loss of faith, moral choice, and personal sacrifice in an environment where we are totally reliant on electronic communication and daily routines; and in which our privacy is routinely compromised. The work is performed by a chamber trio comprising violin, cello and clarinet, with live electronics and live visuals. The work is multi-layered and textured, both sonically and visually, and includes computer generated, fixed-media and live captured image
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!