Embedded Extended Visual Cryptography
暂无分享,去创建一个
[1] Pradeep Krishnadoss,et al. OCSA: Task Scheduling Algorithm in Cloud Computing Environment , 2018 .
[2] Farzin Ahammed T,et al. A master share (2, n) XOR based visual cryptography scheme by random grids , 2015, 2015 International Conference on Control Communication & Computing India (ICCC).
[3] Marten van Dijk,et al. Visual Crypto Displays Enabling Secure Communications , 2003, SPC.
[4] T. Prem Jacob,et al. CGSA scheduler: A multi-objective-based hybrid approach for task scheduling in cloud environment , 2018, Inf. Secur. J. A Glob. Perspect..
[5] Dongdai Lin,et al. Cheating prevention visual cryptography scheme using Latin square , 2017, IET Inf. Secur..
[6] Rohit Srivastava,et al. Hierarchical visual cryptography for grayscale image , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[7] Tzungher Chen,et al. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..
[8] Jeng-Shyang Pan,et al. Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[9] Du-Ming Tsai,et al. An independent component analysis-based filter design for defect detection in low-contrast surface images , 2006, Pattern Recognit..
[10] Annalisa De Bonis,et al. Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..
[11] S. Govindaraju,et al. Visual Secret Sharing Schemes for Color Images Using Halftoning , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[12] S. Srinivasan,et al. An efficient programming rule extraction and detection of violations in software source code using neural networks , 2012, 2012 Fourth International Conference on Advanced Computing (ICoAC).
[13] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[14] Rohit Srivastava,et al. A new technique for color share generation using visual cryptography , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[15] Aaditya Jain,et al. Visual cryptography and image processing based approach for secure transactions in banking sector , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).
[16] Sheshang D. Degadwala,et al. A study of privacy preserving system based on progressive VCS and RST attacks , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).
[17] Snehal Pawar. Extended capabilities of feature-extraction for digital image sharing by diverse image media , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).