Visual Cryptography: A Review
暂无分享,去创建一个
[1] Ran-Zan Wang,et al. Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..
[2] Tung-Shou Chen,et al. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[3] Roopalakshmi. R Chandrasekhara. A Novel Approach Of Secure Banking Application Using Visual Cryptography Against Fake Website Authenticity Theft , 2013 .
[4] HuangShih-Yu,et al. Sharing multiple secrets in visual cryptography , 2007 .
[5] Yuliang Zheng,et al. Human-Machine Identification using Visual Cryptography , 1998 .
[6] Xiaobo Li,et al. On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..
[7] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[8] Elaine Shi,et al. ShadowCrypt: Encrypted Web Applications for Everyone , 2014, CCS.
[9] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[10] Sarika Khandelwal,et al. A Fast and Hardware-Efficient Visual Cryptography Scheme for Images , 2016 .
[11] Awadhesh Srivastava,et al. A secret sharing scheme for secure transmission of color images , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[12] Munaga V. N. K. Prasad,et al. Extended Visual Cryptography Scheme for Multi-secret Sharing , 2016 .
[13] Mudassira Karishma,et al. A Keyless Approach to Image Encryption , 2014 .