Works matching DE "VISUAL cryptography"
Results: 267
Exploring recent advances in random grid visual cryptography algorithms.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 23205, doi. 10.1007/s11227-024-06334-z
- By:
- Publication type:
- Article
Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 300, doi. 10.54216/JCIM.140221
- By:
- Publication type:
- Article
Subliminal Channels in Visual Cryptography.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 3, p. N.PAG, doi. 10.3390/cryptography6030046
- By:
- Publication type:
- Article
Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2023, v. 49, n. 2, p. 100, doi. 10.25195/ijci.v49i2.459
- By:
- Publication type:
- Article
Enhancing Security of the Healthcare Sector using Visual Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1495
- By:
- Publication type:
- Article
Secure Data Transmission through Digital Protection Wall based on RGB Color Model in Wireless Network.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, n. 2, p. 111
- By:
- Publication type:
- Article
The effect of image fractal properties and its interaction with visual discomfort on gait kinematics.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-42114-0
- By:
- Publication type:
- Article
Underwater image quality assessment method based on color space multi-feature fusion.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-44179-3
- By:
- Publication type:
- Article
The effect of image fractal properties and its interaction with visual discomfort on gait kinematics.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-42114-0
- By:
- Publication type:
- Article
Three-dimensional shape generation via variational autoencoder generative adversarial network with signed distance function.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4009, doi. 10.11591/ijece.v13i4.pp4009-4019
- By:
- Publication type:
- Article
Meta-optics empowered vector visual cryptography for high security and rapid decryption.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37510-z
- By:
- Publication type:
- Article
Efficient Technique for Image Cryptography Using Sudoku Keys.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 1, p. 1326, doi. 10.32604/cmc.2023.035856
- By:
- Publication type:
- Article
Clustering Reference Images Based on Covisibility for Visual Localization.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 2705, doi. 10.32604/cmc.2023.034136
- By:
- Publication type:
- Article
Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography.
- Published in:
- Computers, Materials & Continua, 2021, v. 67, n. 1, p. 1207, doi. 10.32604/cmc.2021.014293
- By:
- Publication type:
- Article
Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1283, doi. 10.32604/cmc.2020.011226
- By:
- Publication type:
- Article
Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography.
- Published in:
- Computers, Materials & Continua, 2018, v. 55, n. 2, p. 255, doi. 10.3970/cmc.2018.01732
- By:
- Publication type:
- Article
Research on Texture Classification Based on Multi-Scale Information Fusion.
- Published in:
- Journal of Advanced Computational Intelligence & Intelligent Informatics, 2023, v. 27, n. 2, p. 207, doi. 10.20965/jaciii.2023.p0207
- By:
- Publication type:
- Article
Reversible Data Hiding for Electronic Patient Information Security for Telemedicine Applications.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2021, v. 46, n. 9, p. 9129, doi. 10.1007/s13369-021-05716-2
- By:
- Publication type:
- Article
SECURE DIGITAL DATA VISUAL SHARING SCHEMES IN MULTI-OWNER PUBLIC CLOUD ENVIRONMENT APPLICATIONS.
- Published in:
- Scalable Computing: Practice & Experience, 2025, v. 26, n. 1, p. 84, doi. 10.12694/scpe.v26i1.3574
- By:
- Publication type:
- Article
A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques.
- Published in:
- International Journal of Performability Engineering, 2024, v. 20, n. 10, p. 591, doi. 10.23940/ijpe.24.10.p1.591601
- By:
- Publication type:
- Article
A Visual Cryptography Scheme-Based DNA Microarrays.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 2, p. 334, doi. 10.23940/ijpe.18.02.p14.334340
- By:
- Publication type:
- Article
Near-optimal pitch of a moiré grating in dynamic visual cryptography.
- Published in:
- Journal of Vibroengineering, 2018, v. 20, n. 6, p. 2504, doi. 10.21595/jve.2018.20189
- By:
- Publication type:
- Article
A new image alternate encryption algorithm based on chaotic map.
- Published in:
- Nonlinear Dynamics, 2014, v. 76, n. 4, p. 1943, doi. 10.1007/s11071-014-1259-7
- By:
- Publication type:
- Article
Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization Algorithms.
- Published in:
- International Journal of Image & Graphics, 2023, v. 23, n. 6, p. 1, doi. 10.1142/S0219467823500596
- By:
- Publication type:
- Article
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.
- Published in:
- International Journal of Image & Graphics, 2023, v. 23, n. 4, p. 1, doi. 10.1142/S0219467823500353
- By:
- Publication type:
- Article
Secure Content Based Image Retrieval System Using Deep Learning.
- Published in:
- Journal of Basrah Researches (Sciences), 2023, v. 49, n. 2, p. 94, doi. 10.56714/bjrs.49.2.9
- By:
- Publication type:
- Article
SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM.
- Published in:
- ICTACT Journal on Image & Video Processing, 2015, v. 6, n. 1, p. 1072, doi. 10.21917/ijivp.2015.0157
- By:
- Publication type:
- Article
ENHANCING TRANSMITTED TEXT SECURITY WITH IMAGE KEY CRYPTOGRAPHY AND DEEPNETS.
- Published in:
- ICTACT Journal on Communication Technology, 2023, v. 14, n. 2, p. 2959, doi. 10.21917/ijct.2023.0440
- By:
- Publication type:
- Article
A NEW FRAMEWORK FOR BIOMETRIC FACE RECOGNITION USING VISUAL CRYPTOGRAPY.
- Published in:
- Annals of DAAAM & Proceedings, 2012, v. 23, n. 1, p. 0163
- By:
- Publication type:
- Article
Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography.
- Published in:
- IETE Journal of Research, 2024, v. 70, n. 2, p. 1638, doi. 10.1080/03772063.2022.2142684
- By:
- Publication type:
- Article
New Copyright Protection Scheme for Digital Images Based on Visual Cryptography.
- Published in:
- IETE Journal of Research, 2017, v. 63, n. 6, p. 870, doi. 10.1080/03772063.2017.1324328
- By:
- Publication type:
- Article
Underwater low-light enhancement network based on bright channel prior and attention mechanism.
- Published in:
- PLoS ONE, 2023, v. 17, n. 2, p. 1, doi. 10.1371/journal.pone.0281093
- By:
- Publication type:
- Article
The relationship between religiosity and meaningful work among Malaysian Muslim employees: The mediating role of existential labor.
- Published in:
- PLoS ONE, 2022, v. 17, n. 12, p. 1, doi. 10.1371/journal.pone.0279251
- By:
- Publication type:
- Article
Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 3, p. 2933, doi. 10.32604/iasc.2023.034689
- By:
- Publication type:
- Article
Controlled-Adaptable Distributed Data and File Sharing with Multiple Participants in Visual Cryptography.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 1, p. 370
- By:
- Publication type:
- Article
A (t, n) threshold quantum image secret sharing scheme.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 79715, doi. 10.1007/s11042-024-18661-7
- By:
- Publication type:
- Article
Enhanced block based progressive visual secret sharing scheme for grayscale and color image.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 50519, doi. 10.1007/s11042-023-17416-0
- By:
- Publication type:
- Article
Hiding EPR and watermark in medical images using repeated pixel differencing.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 43577, doi. 10.1007/s11042-023-15434-6
- By:
- Publication type:
- Article
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 18, p. 28087, doi. 10.1007/s11042-023-14683-9
- By:
- Publication type:
- Article
Extending boolean operations-based secret image sharing to compartmented access structure.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 22063, doi. 10.1007/s11042-021-11554-z
- By:
- Publication type:
- Article
An extendable key space integer image-cipher using 4-bit piece-wise linear cat map.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 10, p. 14609, doi. 10.1007/s11042-022-13779-y
- By:
- Publication type:
- Article
Improvement of image transmission using chaotic system and elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 1, p. 1149, doi. 10.1007/s11042-022-13253-9
- By:
- Publication type:
- Article
A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 30, p. 43125, doi. 10.1007/s11042-022-13187-2
- By:
- Publication type:
- Article
A TTP watermarking protocol based on visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 28, p. 41079, doi. 10.1007/s11042-022-13002-y
- By:
- Publication type:
- Article
A fake threshold visual cryptography of QR code.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 27, p. 39635, doi. 10.1007/s11042-022-13011-x
- By:
- Publication type:
- Article
A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 38019, doi. 10.1007/s11042-022-13136-z
- By:
- Publication type:
- Article
On FPGA implementation in medical secret image sharing with data hiding.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 13, p. 18755, doi. 10.1007/s11042-022-12451-9
- By:
- Publication type:
- Article
A cheating immune (k, n) visual cryptography scheme by using the rotation of shares.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 6235, doi. 10.1007/s11042-021-11692-4
- By:
- Publication type:
- Article
An overview of visual cryptography techniques.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 31927, doi. 10.1007/s11042-021-11229-9
- By:
- Publication type:
- Article
Authentic secret share creation techniques using visual cryptography with public key encryption.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- By:
- Publication type:
- Article