Journal articles on the topic 'Visual cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Visual cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Full textLakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.
Full textGopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.
Full textVenu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.
Full textPawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.
Full textShi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.
Full textShaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.
Full textZhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.
Full textRan-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.
Full textTridib, Chakraborty, Ghosh Sudeep, Ghosh Trishita, Md. Mizan Chowdhury, and Karmakar Suparna. "(3, 3) Visual Cryptography for Online Certificate Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 152–56. https://doi.org/10.35940/ijeat.F1302.089620.
Full textAswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.
Full textPratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.
Full textDr.M.Revathi, Dr M., Devi D, Dr R. Dr.R.Menaha, R. .., and Mr S. Mohan. "Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 300–310. http://dx.doi.org/10.54216/jcim.140221.
Full textUno, Katsuhiro, and Hoang Hoa Tien Dung. "Visual Cryptography by Speckle Pattern Illumination." Journal of the Institute of Industrial Applications Engineers 4, no. 1 (2016): 26–32. http://dx.doi.org/10.12792/jiiae.4.26.
Full textChhetri, Bijoy, Sandeep Gurung, and M.K. Ghose. "Survey of Multiple Information Hiding Techniques using Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 01 (2015): 1483–88. https://doi.org/10.5281/zenodo.14768528.
Full textVaya, Dipesh, Sarika Khandelwal, and Teena Hadpawat. "Visual Cryptography: A Review." International Journal of Computer Applications 174, no. 5 (2017): 40–43. http://dx.doi.org/10.5120/ijca2017915406.
Full textHikmat, Yaseen, and Muna Mahmood. "Binary Image Visual Cryptography." International Journal of Computer Applications 177, no. 6 (2017): 34–39. http://dx.doi.org/10.5120/ijca2017915785.
Full textSoman, Nidhin, and Smruthy Baby. "XOR-Based Visual Cryptography." International Journal on Cybernetics & Informatics 5, no. 2 (2016): 253–64. http://dx.doi.org/10.5121/ijci.2016.5228.
Full textShah, Sanket. "VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY." International Journal of Advanced Research in Computer Science 9, no. 5 (2018): 9–13. http://dx.doi.org/10.26483/ijarcs.v9i5.6286.
Full textJin, Duo. "Progressive color visual cryptography." Journal of Electronic Imaging 14, no. 3 (2005): 033019. http://dx.doi.org/10.1117/1.1993625.
Full textLiu, F., C. K. Wu, and X. J. Lin. "Colour visual cryptography schemes." IET Information Security 2, no. 4 (2008): 151. http://dx.doi.org/10.1049/iet-ifs:20080066.
Full textJia, Xingxing, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. "Collaborative Visual Cryptography Schemes." IEEE Transactions on Circuits and Systems for Video Technology 28, no. 5 (2018): 1056–70. http://dx.doi.org/10.1109/tcsvt.2016.2631404.
Full textHorng, Gwoboa, Tzungher Chen, and Du-shiau Tsai. "Cheating in Visual Cryptography." Designs, Codes and Cryptography 38, no. 2 (2006): 219–36. http://dx.doi.org/10.1007/s10623-005-6342-0.
Full textKlein, Andreas, and Markus Wessler. "Extended visual cryptography schemes." Information and Computation 205, no. 5 (2007): 716–32. http://dx.doi.org/10.1016/j.ic.2006.12.005.
Full textLiu, Bin, Ralph R. Martin, Ji-Wu Huang, and Shi-Min Hu. "Structure Aware Visual Cryptography." Computer Graphics Forum 33, no. 7 (2014): 141–50. http://dx.doi.org/10.1111/cgf.12482.
Full textCimato, S., R. De Prisco, and A. De Santis. "Probabilistic Visual Cryptography Schemes." Computer Journal 49, no. 1 (2005): 97–107. http://dx.doi.org/10.1093/comjnl/bxh152.
Full textRan-Zan Wang. "Region Incrementing Visual Cryptography." IEEE Signal Processing Letters 16, no. 8 (2009): 659–62. http://dx.doi.org/10.1109/lsp.2009.2021334.
Full textYengisetty, Subba Rao V., and Bimal K. Roy. "Applications of visual cryptography." International Journal of Parallel, Emergent and Distributed Systems 26, no. 5 (2011): 429–42. http://dx.doi.org/10.1080/17445760.2011.574628.
Full textLu, Steve, Daniel Manchala, and Rafail Ostrovsky. "Visual cryptography on graphs." Journal of Combinatorial Optimization 21, no. 1 (2009): 47–66. http://dx.doi.org/10.1007/s10878-009-9241-x.
Full textDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Full textThorat, Nilesh N., Amit Singla, and Tanaji Dhaigude. "Sharing Secret Colour Images with Embedded Visual Cryptography Using the Stamping Algorithm and OTP Procedure." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 63–70. http://dx.doi.org/10.17762/ijritcc.v11i6.7058.
Full textKUMAR, K. TULASI KRISHNA, and G. MADHU NISHA. "High Security Encryption Using AES and Visual Cryptography." International Scientific Journal of Engineering and Management 04, no. 07 (2025): 1–9. https://doi.org/10.55041/isjem04733.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textA, Soundarya B., Sowmeya D, and Yazhini G. V. "Visual Cryptography for Image Processing: A Survey." International Journal of Trend in Scientific Research and Development Volume-2, Issue-1 (2017): 1417–21. http://dx.doi.org/10.31142/ijtsrd8206.
Full textSona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.
Full textPallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.
Full textBrindha, K., and N. Jeyanthi. "Secret Image Enhanced Sharing Using Visual Cryptography." Cybernetics and Information Technologies 17, no. 3 (2017): 128–39. http://dx.doi.org/10.1515/cait-2017-0034.
Full textBhagate, Suhas, and Prakash J. Kulkarni. "Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization." International Journal of Information Security and Privacy 15, no. 2 (2021): 196–216. http://dx.doi.org/10.4018/ijisp.2021040110.
Full textWang, Guangyu, Feng Liu, and Wei Qi Yan. "Basic Visual Cryptography Using Braille." International Journal of Digital Crime and Forensics 8, no. 3 (2016): 85–93. http://dx.doi.org/10.4018/ijdcf.2016070106.
Full textBudhewar, Anmol S., and Shubhanand S. Hatkar. "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7, no. 4 (2019): 1148–52. http://dx.doi.org/10.26438/ijcse/v7i4.11481152.
Full textSandeep, Jerripothula. "Embedded Extended Visual Cryptography Scheme." IOSR Journal of Computer Engineering 8, no. 1 (2012): 41–47. http://dx.doi.org/10.9790/0661/0814147.
Full textHammoudi, Karim, and Mahmoud Melkemi. "Personalized Shares in Visual Cryptography." Journal of Imaging 4, no. 11 (2018): 126. http://dx.doi.org/10.3390/jimaging4110126.
Full textKoptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.
Full text., Megha Goel. "AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY." International Journal of Research in Engineering and Technology 02, no. 11 (2013): 271–74. http://dx.doi.org/10.15623/ijret.2013.0211041.
Full textRoss, Arun, and Asem Othman. "Visual Cryptography for Biometric Privacy." IEEE Transactions on Information Forensics and Security 6, no. 1 (2011): 70–81. http://dx.doi.org/10.1109/tifs.2010.2097252.
Full textLiu, Feng, and Chuankun Wu. "Embedded Extended Visual Cryptography Schemes." IEEE Transactions on Information Forensics and Security 6, no. 2 (2011): 307–22. http://dx.doi.org/10.1109/tifs.2011.2116782.
Full textStinson, D. "Visual cryptography and threshold schemes." IEEE Potentials 18, no. 1 (1999): 13–16. http://dx.doi.org/10.1109/45.747238.
Full textWeir, Jonathan, Weiqi Yan, and Mohan S. Kankanhalli. "Image hatching for visual cryptography." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 2S (2012): 1–15. http://dx.doi.org/10.1145/2344436.2344438.
Full textShi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.
Full text