Books on the topic 'Visual cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 42 books for your research on the topic 'Visual cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Yan, Bin, Yong Xiang, and Guang Hua. Improving Image Quality in Visual Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-8289-5.
Full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5.
Full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1.
Full textK, kokula Krishna Hari, ed. Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.
Find full textKUMAR, Pratheek PRAVEEN. Steganography Using Visual Cryptography. Independently Published, 2018.
Find full textKumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textBhagat, Ruchir Ruchir, Shiksha Shiksha Suvarna, and Pratheek Praveen Pratheek Praveen Kumar. Steganography Using Visual Cryptography. Independently Published, 2017.
Find full textKumar, Pratheek Praveen. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textKumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textKumar, Pratheek Praveen, Shiksha SUVARNA, and Ruchir BHAGAT. Steganography Using Visual Cryptography. Independently Published, 2018.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio. Visual Cryptography and Secret Image Sharing. CRC Press, 2011. http://dx.doi.org/10.1201/b11068.
Full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2011.
Find full textHua, Guang, Yong Xiang, and Bin Yan. Improving Image Quality in Visual Cryptography. Springer Singapore Pte. Limited, 2019.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textHua, Guang, Yong Xiang, and Bin Yan. Improving Image Quality in Visual Cryptography. Springer Singapore Pte. Limited, 2020.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2015.
Find full textVisual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2014.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer London, Limited, 2015.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2016.
Find full textCryptography for Visual Basic: A programmer's guide to the Microsoft CryptoAPI. John Wiley, 2000.
Find full textShi, Yun Q., Feng Liu, and Weiqi Yan. Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography. Springer London, Limited, 2014.
Find full textAuthentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Fachmedien Wiesbaden GmbH, 2014.
Find full textShi, Yun Q., Feng Liu, and Weiqi Yan. Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography. Springer, 2014.
Find full textBondi, Richard. Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI. John Wiley & Sons, 2000.
Find full textPape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, 2014.
Find full textPape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2014.
Find full textDu bon usage des images: Autour des codes visuels en Chine et au Japon = About images and visual codes in China and Japan. Presses universitaires de Vincennes, 2008.
Find full textBasu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.
Find full textBasu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.
Find full textBasu, Abhishek, Subhrajit Sinha Roy, and Avik Chattopadhyay. Intelligent Copyright Protection for Images. Taylor & Francis Group, 2019.
Find full textRawlinson, Jules. A Requiem for Edward Snowden. University of Edinburgh, 2024. http://dx.doi.org/10.2218/ed.9781836450566.
Full text