To see the other types of publications on this topic, follow the link: Visual cryptography.

Journal articles on the topic 'Visual cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Visual cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.

Full text
Abstract:
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption
APA, Harvard, Vancouver, ISO, and other styles
2

Priya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.

Full text
Abstract:
The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated i
APA, Harvard, Vancouver, ISO, and other styles
3

Lakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.

Full text
Abstract:
This article is a deal with the Review study of visual cryptography there is a need for study. The information helps the mathematician, computer engineers, Academicians’ and researchers for better understanding of data whenever it is required. So for this a study is made on the basis of secondary data. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography is a new technique
APA, Harvard, Vancouver, ISO, and other styles
4

Gopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s brows
APA, Harvard, Vancouver, ISO, and other styles
5

Venu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s brows
APA, Harvard, Vancouver, ISO, and other styles
6

Pawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ran-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tridib, Chakraborty, Ghosh Sudeep, Ghosh Trishita, Md. Mizan Chowdhury, and Karmakar Suparna. "(3, 3) Visual Cryptography for Online Certificate Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 152–56. https://doi.org/10.35940/ijeat.F1302.089620.

Full text
Abstract:
Today organizations face a challenge while recruiting candidates, who provide forged mark sheets in order to get a job. To prevent wrong hiring a detailed and thorough approach is needed to verify the authentication of both the candidate and the marks obtained by him/her. There are so many modern cryptographic protocols available which can be used for authenticating individual’s academic achievement certificates. Visual Cryptography is a simple and secure way to allow the secret sharing of images without any cryptographic computations or the use of encryption or decryption keys. The nove
APA, Harvard, Vancouver, ISO, and other styles
12

Aswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.

Full text
Abstract:
Abstract Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance the visual quality and avoid t
APA, Harvard, Vancouver, ISO, and other styles
13

Pratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.

Full text
Abstract:
With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This tec
APA, Harvard, Vancouver, ISO, and other styles
14

Dr.M.Revathi, Dr M., Devi D, Dr R. Dr.R.Menaha, R. .., and Mr S. Mohan. "Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 300–310. http://dx.doi.org/10.54216/jcim.140221.

Full text
Abstract:
By splitting a picture into many parts, which, when reassembled, disclose the original image without requiring complicated math, visual cryptography is a strong method for protecting visual information. Problems with pixel enlargement, decreased picture quality, and restricted access structures are common with traditional visual cryptography techniques. Our proposed improved visual cryptography approach incorporates pixel-wise operations and critical access structures to solve these challenges and increase flexibility, picture quality, and security. To reconstruct a picture, our technique call
APA, Harvard, Vancouver, ISO, and other styles
15

Uno, Katsuhiro, and Hoang Hoa Tien Dung. "Visual Cryptography by Speckle Pattern Illumination." Journal of the Institute of Industrial Applications Engineers 4, no. 1 (2016): 26–32. http://dx.doi.org/10.12792/jiiae.4.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chhetri, Bijoy, Sandeep Gurung, and M.K. Ghose. "Survey of Multiple Information Hiding Techniques using Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 01 (2015): 1483–88. https://doi.org/10.5281/zenodo.14768528.

Full text
Abstract:
Information now a day"s seems to have become abundant and the secure transmission and visualization of it has been a challenge. The major security concerns are of Authentication, Confidentiality and Data Integrity. In regard to this, the various security methodologies have been introduced and Cryptography is one of the schemes where the information is transferred in the disguise form and only authentic user can reveal the exact information. Various Cryptographic techniques has played a very vital role in this regard, among which Visual Cryptographic System(VCS) is one of such kind where the se
APA, Harvard, Vancouver, ISO, and other styles
17

Vaya, Dipesh, Sarika Khandelwal, and Teena Hadpawat. "Visual Cryptography: A Review." International Journal of Computer Applications 174, no. 5 (2017): 40–43. http://dx.doi.org/10.5120/ijca2017915406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hikmat, Yaseen, and Muna Mahmood. "Binary Image Visual Cryptography." International Journal of Computer Applications 177, no. 6 (2017): 34–39. http://dx.doi.org/10.5120/ijca2017915785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Soman, Nidhin, and Smruthy Baby. "XOR-Based Visual Cryptography." International Journal on Cybernetics & Informatics 5, no. 2 (2016): 253–64. http://dx.doi.org/10.5121/ijci.2016.5228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Shah, Sanket. "VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY." International Journal of Advanced Research in Computer Science 9, no. 5 (2018): 9–13. http://dx.doi.org/10.26483/ijarcs.v9i5.6286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jin, Duo. "Progressive color visual cryptography." Journal of Electronic Imaging 14, no. 3 (2005): 033019. http://dx.doi.org/10.1117/1.1993625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, F., C. K. Wu, and X. J. Lin. "Colour visual cryptography schemes." IET Information Security 2, no. 4 (2008): 151. http://dx.doi.org/10.1049/iet-ifs:20080066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jia, Xingxing, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. "Collaborative Visual Cryptography Schemes." IEEE Transactions on Circuits and Systems for Video Technology 28, no. 5 (2018): 1056–70. http://dx.doi.org/10.1109/tcsvt.2016.2631404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Horng, Gwoboa, Tzungher Chen, and Du-shiau Tsai. "Cheating in Visual Cryptography." Designs, Codes and Cryptography 38, no. 2 (2006): 219–36. http://dx.doi.org/10.1007/s10623-005-6342-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Klein, Andreas, and Markus Wessler. "Extended visual cryptography schemes." Information and Computation 205, no. 5 (2007): 716–32. http://dx.doi.org/10.1016/j.ic.2006.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Bin, Ralph R. Martin, Ji-Wu Huang, and Shi-Min Hu. "Structure Aware Visual Cryptography." Computer Graphics Forum 33, no. 7 (2014): 141–50. http://dx.doi.org/10.1111/cgf.12482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cimato, S., R. De Prisco, and A. De Santis. "Probabilistic Visual Cryptography Schemes." Computer Journal 49, no. 1 (2005): 97–107. http://dx.doi.org/10.1093/comjnl/bxh152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ran-Zan Wang. "Region Incrementing Visual Cryptography." IEEE Signal Processing Letters 16, no. 8 (2009): 659–62. http://dx.doi.org/10.1109/lsp.2009.2021334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Yengisetty, Subba Rao V., and Bimal K. Roy. "Applications of visual cryptography." International Journal of Parallel, Emergent and Distributed Systems 26, no. 5 (2011): 429–42. http://dx.doi.org/10.1080/17445760.2011.574628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lu, Steve, Daniel Manchala, and Rafail Ostrovsky. "Visual cryptography on graphs." Journal of Combinatorial Optimization 21, no. 1 (2009): 47–66. http://dx.doi.org/10.1007/s10878-009-9241-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.

Full text
Abstract:
Now a day‟s the uses of devices such as computer, mobile and many more other device for communication as well as for data storage and transmission has increases. As a result there is increase in no of user‟s also there is increase in no of unauthorized user‟s which are trying to access a data by unfair means. This arises the problem of data security. To solve this problem a data is stored or transmitted in the encrypted format. This encrypted data is unreadable to the unauthorized user. Cryptography is a science of information security which secures the data while the data is being transmitted
APA, Harvard, Vancouver, ISO, and other styles
32

Thorat, Nilesh N., Amit Singla, and Tanaji Dhaigude. "Sharing Secret Colour Images with Embedded Visual Cryptography Using the Stamping Algorithm and OTP Procedure." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 63–70. http://dx.doi.org/10.17762/ijritcc.v11i6.7058.

Full text
Abstract:
Finding a way to ensure the safety of media is becoming increasingly common in the modern world as digital media usage increases. Visual cryptography (VC) offers an efficient method for sending images securely. Images that have been protected using visual encryption can be decoded using features of human vision. Emails are not a highly safe method of exchanging private data because someone else can quickly weaken the content. In the visual cryptography technique, we presented for colour pictures, the divided shares are enclosed in additional pictures using stamping. Using a random number gener
APA, Harvard, Vancouver, ISO, and other styles
33

KUMAR, K. TULASI KRISHNA, and G. MADHU NISHA. "High Security Encryption Using AES and Visual Cryptography." International Scientific Journal of Engineering and Management 04, no. 07 (2025): 1–9. https://doi.org/10.55041/isjem04733.

Full text
Abstract:
In the digital communication era, ensuring the security and confidentiality of sensitive information is crucial. This project proposes a robust encryption scheme that combines Advanced Encryption Standard (AES) with Visual Cryptography (VC) to achieve high security, reliability, and efficiency.The application allows users to encrypt and decrypt files through a user-friendly GUI built with Python's Tkinter library. Users provide a key to XOR each byte of the file's content for encryption, and the process is reversed for decryption. The tool includes comprehensive error handling to manage file a
APA, Harvard, Vancouver, ISO, and other styles
34

Zahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.

Full text
Abstract:
Cryptography held an important role in the digital era for securing data from hackers. As technology develops, types of data that can be secured using cryptography is expanding, one of which is securing images using visual cryptography. Visual cryptography is a cryptosystem that splits an image into parts and can only be solved if it has all parts of the image. Another type of cryptography that can be used to secure data is Elliptic Curve Cryptography (ECC). ECC uses a field of prime numbers consists of points on the elliptic curve as a technique to secure data. In this research, a cryptosyste
APA, Harvard, Vancouver, ISO, and other styles
35

A, Soundarya B., Sowmeya D, and Yazhini G. V. "Visual Cryptography for Image Processing: A Survey." International Journal of Trend in Scientific Research and Development Volume-2, Issue-1 (2017): 1417–21. http://dx.doi.org/10.31142/ijtsrd8206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.

Full text
Abstract:
The abstract focuses on the concept of e-commerce transactions using visual cryptography. E-commerce has revolutionized the way businesses operate and has become an integral part of our daily lives. However, the security of online transactions remains a critical concern. Visual cryptography is a technique that allows the secure transmission of images or information through encryption and decryption processes. This abstract explores the potential of visual cryptography in enhancing the security of e-commerce transactions. It discusses the advantages and challenges of using visual cryptography a
APA, Harvard, Vancouver, ISO, and other styles
37

Pallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.

Full text
Abstract:
Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography. Visual cryptography encrypts secret information into two pieces called as shares. These two shares are stacked together by logical XOR operation to reveal the original secret. Hierarchical visual cryptography encrypts the secret in various levels. The encryption in turn is expansionless. The original secret size is retained in the shares at all levels. In this paper secret is encrypted at two different levels. Four shares are generated o
APA, Harvard, Vancouver, ISO, and other styles
38

Brindha, K., and N. Jeyanthi. "Secret Image Enhanced Sharing Using Visual Cryptography." Cybernetics and Information Technologies 17, no. 3 (2017): 128–39. http://dx.doi.org/10.1515/cait-2017-0034.

Full text
Abstract:
Abstract In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image becomes accessible to every individual member and there is an inherent risk of any one of the members in the group using the valuable information for illegal purposes as an intruder. To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group t
APA, Harvard, Vancouver, ISO, and other styles
39

Bhagate, Suhas, and Prakash J. Kulkarni. "Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization." International Journal of Information Security and Privacy 15, no. 2 (2021): 196–216. http://dx.doi.org/10.4018/ijisp.2021040110.

Full text
Abstract:
Security of information is of much concern in the modern internet era. Secret sharing schemes provide mechanism of encrypting secret information to prevent illicit usage. Visual cryptography is a secret sharing technique that facilitates encryption of a secret image. Visual cryptography allows us to effectively and efficiently share secrets among a number of trusted parties by hiding secrets within images. These images are encoded into multiple shares as per the rules indicated in basis matrices and later decoded by stacking required number of shares. Progressive visual cryptography has a spec
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Guangyu, Feng Liu, and Wei Qi Yan. "Basic Visual Cryptography Using Braille." International Journal of Digital Crime and Forensics 8, no. 3 (2016): 85–93. http://dx.doi.org/10.4018/ijdcf.2016070106.

Full text
Abstract:
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Braille where white and black dots are arranged in certain orders, it is feasible to utilize the feature of Braille for the authentication of VC. In this paper, the authors will conduct an experiment embed
APA, Harvard, Vancouver, ISO, and other styles
41

Budhewar, Anmol S., and Shubhanand S. Hatkar. "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7, no. 4 (2019): 1148–52. http://dx.doi.org/10.26438/ijcse/v7i4.11481152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Sandeep, Jerripothula. "Embedded Extended Visual Cryptography Scheme." IOSR Journal of Computer Engineering 8, no. 1 (2012): 41–47. http://dx.doi.org/10.9790/0661/0814147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hammoudi, Karim, and Mahmoud Melkemi. "Personalized Shares in Visual Cryptography." Journal of Imaging 4, no. 11 (2018): 126. http://dx.doi.org/10.3390/jimaging4110126.

Full text
Abstract:
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares. In existing methods, the surface of key images is not visually pleasant and is not exploited for communicating textual or pictorial information. Presently, we propose a pictogram-based visual cryptography technique, which generates shares textured with customizable and aesthetic rendering. Moreover, robustness characteristics of this technique to the automated decoding of the secret me
APA, Harvard, Vancouver, ISO, and other styles
44

Koptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.

Full text
Abstract:
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping alg
APA, Harvard, Vancouver, ISO, and other styles
45

., Megha Goel. "AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY." International Journal of Research in Engineering and Technology 02, no. 11 (2013): 271–74. http://dx.doi.org/10.15623/ijret.2013.0211041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ross, Arun, and Asem Othman. "Visual Cryptography for Biometric Privacy." IEEE Transactions on Information Forensics and Security 6, no. 1 (2011): 70–81. http://dx.doi.org/10.1109/tifs.2010.2097252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Feng, and Chuankun Wu. "Embedded Extended Visual Cryptography Schemes." IEEE Transactions on Information Forensics and Security 6, no. 2 (2011): 307–22. http://dx.doi.org/10.1109/tifs.2011.2116782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Stinson, D. "Visual cryptography and threshold schemes." IEEE Potentials 18, no. 1 (1999): 13–16. http://dx.doi.org/10.1109/45.747238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Weir, Jonathan, Weiqi Yan, and Mohan S. Kankanhalli. "Image hatching for visual cryptography." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 2S (2012): 1–15. http://dx.doi.org/10.1145/2344436.2344438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!