Journal articles on the topic 'Visual cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Visual cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Full textPawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (January 1, 2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.
Full textShi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (November 2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.
Full textShaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (January 15, 2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.
Full textZhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (August 2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.
Full textRan-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (November 2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.
Full textUno, Katsuhiro, and Hoang Hoa Tien Dung. "Visual Cryptography by Speckle Pattern Illumination." Journal of the Institute of Industrial Applications Engineers 4, no. 1 (January 25, 2016): 26–32. http://dx.doi.org/10.12792/jiiae.4.26.
Full textAswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.
Full textVaya, Dipesh, Sarika Khandelwal, and Teena Hadpawat. "Visual Cryptography: A Review." International Journal of Computer Applications 174, no. 5 (September 15, 2017): 40–43. http://dx.doi.org/10.5120/ijca2017915406.
Full textHikmat, Yaseen, and Muna Mahmood. "Binary Image Visual Cryptography." International Journal of Computer Applications 177, no. 6 (November 15, 2017): 34–39. http://dx.doi.org/10.5120/ijca2017915785.
Full textSoman, Nidhin, and Smruthy Baby. "XOR-Based Visual Cryptography." International Journal on Cybernetics & Informatics 5, no. 2 (April 30, 2016): 253–64. http://dx.doi.org/10.5121/ijci.2016.5228.
Full textShah, Sanket. "VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY." International Journal of Advanced Research in Computer Science 9, no. 5 (October 20, 2018): 9–13. http://dx.doi.org/10.26483/ijarcs.v9i5.6286.
Full textJin, Duo. "Progressive color visual cryptography." Journal of Electronic Imaging 14, no. 3 (July 1, 2005): 033019. http://dx.doi.org/10.1117/1.1993625.
Full textLiu, F., C. K. Wu, and X. J. Lin. "Colour visual cryptography schemes." IET Information Security 2, no. 4 (2008): 151. http://dx.doi.org/10.1049/iet-ifs:20080066.
Full textJia, Xingxing, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. "Collaborative Visual Cryptography Schemes." IEEE Transactions on Circuits and Systems for Video Technology 28, no. 5 (May 2018): 1056–70. http://dx.doi.org/10.1109/tcsvt.2016.2631404.
Full textHorng, Gwoboa, Tzungher Chen, and Du-shiau Tsai. "Cheating in Visual Cryptography." Designs, Codes and Cryptography 38, no. 2 (February 2006): 219–36. http://dx.doi.org/10.1007/s10623-005-6342-0.
Full textKlein, Andreas, and Markus Wessler. "Extended visual cryptography schemes." Information and Computation 205, no. 5 (May 2007): 716–32. http://dx.doi.org/10.1016/j.ic.2006.12.005.
Full textLiu, Bin, Ralph R. Martin, Ji-Wu Huang, and Shi-Min Hu. "Structure Aware Visual Cryptography." Computer Graphics Forum 33, no. 7 (October 2014): 141–50. http://dx.doi.org/10.1111/cgf.12482.
Full textCimato, S., R. De Prisco, and A. De Santis. "Probabilistic Visual Cryptography Schemes." Computer Journal 49, no. 1 (December 1, 2005): 97–107. http://dx.doi.org/10.1093/comjnl/bxh152.
Full textRan-Zan Wang. "Region Incrementing Visual Cryptography." IEEE Signal Processing Letters 16, no. 8 (August 2009): 659–62. http://dx.doi.org/10.1109/lsp.2009.2021334.
Full textYengisetty, Subba Rao V., and Bimal K. Roy. "Applications of visual cryptography." International Journal of Parallel, Emergent and Distributed Systems 26, no. 5 (October 2011): 429–42. http://dx.doi.org/10.1080/17445760.2011.574628.
Full textLu, Steve, Daniel Manchala, and Rafail Ostrovsky. "Visual cryptography on graphs." Journal of Combinatorial Optimization 21, no. 1 (June 18, 2009): 47–66. http://dx.doi.org/10.1007/s10878-009-9241-x.
Full textDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Full textA, Soundarya B., Sowmeya D, and Yazhini G. V. "Visual Cryptography for Image Processing: A Survey." International Journal of Trend in Scientific Research and Development Volume-2, Issue-1 (December 31, 2017): 1417–21. http://dx.doi.org/10.31142/ijtsrd8206.
Full textBrindha, K., and N. Jeyanthi. "Secret Image Enhanced Sharing Using Visual Cryptography." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 128–39. http://dx.doi.org/10.1515/cait-2017-0034.
Full textSona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.
Full textGoud, Sangeetha S., Swathi S. Patil, and S. Vishal. "Enhanced Security Scheme with Visual Cryptography and Steganography." Bonfring International Journal of Research in Communication Engineering 6, Special Issue (November 30, 2016): 120–23. http://dx.doi.org/10.9756/bijrce.8216.
Full textWang, Guangyu, Feng Liu, and Wei Qi Yan. "Basic Visual Cryptography Using Braille." International Journal of Digital Crime and Forensics 8, no. 3 (July 2016): 85–93. http://dx.doi.org/10.4018/ijdcf.2016070106.
Full textBudhewar, Anmol S., and Shubhanand S. Hatkar. "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7, no. 4 (April 30, 2019): 1148–52. http://dx.doi.org/10.26438/ijcse/v7i4.11481152.
Full textSandeep, Jerripothula. "Embedded Extended Visual Cryptography Scheme." IOSR Journal of Computer Engineering 8, no. 1 (2012): 41–47. http://dx.doi.org/10.9790/0661/0814147.
Full textHammoudi, Karim, and Mahmoud Melkemi. "Personalized Shares in Visual Cryptography." Journal of Imaging 4, no. 11 (October 29, 2018): 126. http://dx.doi.org/10.3390/jimaging4110126.
Full textKoptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (September 16, 2022): 46. http://dx.doi.org/10.3390/cryptography6030046.
Full text., Megha Goel. "AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY." International Journal of Research in Engineering and Technology 02, no. 11 (November 25, 2013): 271–74. http://dx.doi.org/10.15623/ijret.2013.0211041.
Full textRoss, Arun, and Asem Othman. "Visual Cryptography for Biometric Privacy." IEEE Transactions on Information Forensics and Security 6, no. 1 (March 2011): 70–81. http://dx.doi.org/10.1109/tifs.2010.2097252.
Full textLiu, Feng, and Chuankun Wu. "Embedded Extended Visual Cryptography Schemes." IEEE Transactions on Information Forensics and Security 6, no. 2 (June 2011): 307–22. http://dx.doi.org/10.1109/tifs.2011.2116782.
Full textStinson, D. "Visual cryptography and threshold schemes." IEEE Potentials 18, no. 1 (1999): 13–16. http://dx.doi.org/10.1109/45.747238.
Full textWeir, Jonathan, Weiqi Yan, and Mohan S. Kankanhalli. "Image hatching for visual cryptography." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 2S (September 2012): 1–15. http://dx.doi.org/10.1145/2344436.2344438.
Full textShi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (October 4, 2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.
Full textBender, Andreas O. "Visual cryptography on postage stamps." ACM SIGCAS Computers and Society 45, no. 1 (February 19, 2015): 11–13. http://dx.doi.org/10.1145/2738210.2738212.
Full textLiu, F., C. Wu, and X. Lin. "Cheating immune visual cryptography scheme." IET Information Security 5, no. 1 (2011): 51. http://dx.doi.org/10.1049/iet-ifs.2008.0064.
Full textZhou, Zhili, Ching-Nung Yang, Song-Ruei Cai, and Dao-Shun Wang. "Boolean Operation Based Visual Cryptography." IEEE Access 7 (2019): 165496–508. http://dx.doi.org/10.1109/access.2019.2951722.
Full textLuo, Hao, Hua Chen, Yongheng Shang, Zhenfei Zhao, and Yanhua Zhang. "Color transfer in visual cryptography." Measurement 51 (May 2014): 81–90. http://dx.doi.org/10.1016/j.measurement.2014.01.033.
Full textHou, Young-Chang. "Visual cryptography for color images." Pattern Recognition 36, no. 7 (July 2003): 1619–29. http://dx.doi.org/10.1016/s0031-3203(02)00258-3.
Full textAteniese, Giuseppe, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson. "Extended capabilities for visual cryptography." Theoretical Computer Science 250, no. 1-2 (January 2001): 143–61. http://dx.doi.org/10.1016/s0304-3975(99)00127-9.
Full textTuyls, P., H. D. L. Hollmann, J. H. Van Lint, and L. Tolhuizen. "XOR-based Visual Cryptography Schemes." Designs, Codes and Cryptography 37, no. 1 (October 2005): 169–86. http://dx.doi.org/10.1007/s10623-004-3816-4.
Full textTharayil, Jose J., E. S. Karthik Kumar, and Neena Susan Alex. "Visual Cryptography Using Hybrid Halftoning." Procedia Engineering 38 (2012): 2117–23. http://dx.doi.org/10.1016/j.proeng.2012.06.254.
Full textHajiabolhassan, Hossein, and Abbas Cheraghi. "Bounds for visual cryptography schemes." Discrete Applied Mathematics 158, no. 6 (March 2010): 659–65. http://dx.doi.org/10.1016/j.dam.2009.12.005.
Full textRatnadewi, Christian Dio Alpha G, Darmawan Napitupulu, Heri Nurdiyanto, Nuning Kurniasih, Abdurrozaq Hasibuan, Achmad Daengs, et al. "LUC Algorithm in Visual Cryptography." Journal of Physics: Conference Series 1114 (November 2018): 012090. http://dx.doi.org/10.1088/1742-6596/1114/1/012090.
Full textHu, Chih-Ming, and Wen-Guey Tzeng. "Cheating Prevention in Visual Cryptography." IEEE Transactions on Image Processing 16, no. 1 (January 2007): 36–45. http://dx.doi.org/10.1109/tip.2006.884916.
Full text