Works matching DE "VISUAL cryptography"
Results: 268
A (t, n) threshold quantum image secret sharing scheme.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 79715, doi. 10.1007/s11042-024-18661-7
- By:
- Publication type:
- Article
Enhanced block based progressive visual secret sharing scheme for grayscale and color image.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 50519, doi. 10.1007/s11042-023-17416-0
- By:
- Publication type:
- Article
Hiding EPR and watermark in medical images using repeated pixel differencing.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 43577, doi. 10.1007/s11042-023-15434-6
- By:
- Publication type:
- Article
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 18, p. 28087, doi. 10.1007/s11042-023-14683-9
- By:
- Publication type:
- Article
Extending boolean operations-based secret image sharing to compartmented access structure.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 22063, doi. 10.1007/s11042-021-11554-z
- By:
- Publication type:
- Article
An extendable key space integer image-cipher using 4-bit piece-wise linear cat map.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 10, p. 14609, doi. 10.1007/s11042-022-13779-y
- By:
- Publication type:
- Article
Improvement of image transmission using chaotic system and elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 1, p. 1149, doi. 10.1007/s11042-022-13253-9
- By:
- Publication type:
- Article
A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 30, p. 43125, doi. 10.1007/s11042-022-13187-2
- By:
- Publication type:
- Article
A TTP watermarking protocol based on visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 28, p. 41079, doi. 10.1007/s11042-022-13002-y
- By:
- Publication type:
- Article
A fake threshold visual cryptography of QR code.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 27, p. 39635, doi. 10.1007/s11042-022-13011-x
- By:
- Publication type:
- Article
A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 38019, doi. 10.1007/s11042-022-13136-z
- By:
- Publication type:
- Article
On FPGA implementation in medical secret image sharing with data hiding.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 13, p. 18755, doi. 10.1007/s11042-022-12451-9
- By:
- Publication type:
- Article
A cheating immune (k, n) visual cryptography scheme by using the rotation of shares.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 6235, doi. 10.1007/s11042-021-11692-4
- By:
- Publication type:
- Article
An overview of visual cryptography techniques.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 31927, doi. 10.1007/s11042-021-11229-9
- By:
- Publication type:
- Article
Authentic secret share creation techniques using visual cryptography with public key encryption.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- By:
- Publication type:
- Article
Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32071, doi. 10.1007/s11042-021-11152-z
- By:
- Publication type:
- Article
Reversible image visual transformation for privacy and content protection.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30863, doi. 10.1007/s11042-020-09985-1
- By:
- Publication type:
- Article
Construction of XVCS for (k,n,t)<sup>∗</sup> access structure.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 19, p. 29519, doi. 10.1007/s11042-021-11132-3
- By:
- Publication type:
- Article
A Development and Analysis of Color Image New Blind Watermarking Based on DWT-SVD Swapping and 3-Dimensional Cryptography Technique.
- Published in:
- Fluctuation & Noise Letters, 2023, v. 22, n. 5, p. 1, doi. 10.1142/S0219477523500268
- By:
- Publication type:
- Article
Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023885
- By:
- Publication type:
- Article
Guest Editorial: Blockchain and decentralised solutions for social good.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Anti-phishing Based on Visual Cryptography and 4D hyperchaotic System.
- Published in:
- Iraqi Journal of Information Technology, 2018, v. 9, n. 1, Part 1&2, p. 1
- By:
- Publication type:
- Article
An IPR protection scheme based on wavelet transformation and visual cryptography.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 5, p. 4063, doi. 10.3906/elk-1405-180
- By:
- Publication type:
- Article
Magic sheets: Visual cryptography with common shares.
- Published in:
- Computational Visual Media, 2018, v. 4, n. 2, p. 185, doi. 10.1007/s41095-018-0108-x
- By:
- Publication type:
- Article
CMKG: Construction Method of Knowledge Graph for Image Recognition.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 19, p. 4174, doi. 10.3390/math11194174
- By:
- Publication type:
- Article
Practical Secret Image Sharing Based on the Chinese Remainder Theorem.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 1959, doi. 10.3390/math10121959
- By:
- Publication type:
- Article
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 5, p. 742, doi. 10.3390/math10050742
- By:
- Publication type:
- Article
Two-in-One Secret Image Sharing Scheme with Higher Visual Quality of the Previewed Image.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 5, p. 678, doi. 10.3390/math10050678
- By:
- Publication type:
- Article
Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes.
- Published in:
- Journal of ICT Research & Applications, 2018, v. 12, n. 1, p. 87, doi. 10.5614/itbj.ict.res.appl.2018.12.1.6
- By:
- Publication type:
- Article
Secure Online Voting System using Visual Cryptography.
- Published in:
- Walailak Journal of Science & Technology, 2021, v. 18, n. 15, p. 1, doi. 10.48048/wjst.2021.8972
- By:
- Publication type:
- Article
RG-Based Region Incrementing Visual Cryptography with Abilities of OR and XOR Decryption.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 153, doi. 10.3390/sym16020153
- By:
- Publication type:
- Article
A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 7, p. 1305, doi. 10.3390/sym15071305
- By:
- Publication type:
- Article
Reversible Data Hiding in Encrypted Images Based on an Adaptive Recognition Strategy for Blocks.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 2, p. 524, doi. 10.3390/sym15020524
- By:
- Publication type:
- Article
A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 4, p. N.PAG, doi. 10.3390/sym14040664
- By:
- Publication type:
- Article
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 3, p. 509, doi. 10.3390/sym14030509
- By:
- Publication type:
- Article
Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 1, p. 65, doi. 10.3390/sym13010065
- By:
- Publication type:
- Article
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 41, doi. 10.3390/sym8060041
- By:
- Publication type:
- Article
Real-Time Early Indoor Fire Detection and Localization on Embedded Platforms with Fully Convolutional One-Stage Object Detection.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 3, p. 1794, doi. 10.3390/su15031794
- By:
- Publication type:
- Article
Controlled-Adaptable Distributed Data and File Sharing with Multiple Participants in Visual Cryptography.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 1, p. 370
- By:
- Publication type:
- Article
Comparación entre Varios Esquemas de Criptografía Visual Extendida.
- Published in:
- Información Tecnológica, 2012, v. 23, n. 4, p. 105, doi. 10.4067/S0718-07642012000400013
- By:
- Publication type:
- Article
Criptografía Visual Basada en el Esquema de Umbral: Una Revisión Tutorial.
- Published in:
- Información Tecnológica, 2011, v. 22, n. 5, p. 107, doi. 10.4067/S0718-07642011000500013
- By:
- Publication type:
- Article
Online Voting System Based on Image Steganography and Visual Cryptography.
- Published in:
- Journal of Computing & Information Technology, 2017, v. 25, n. 1, p. 47, doi. 10.20532/cit.2017.1003224
- By:
- Publication type:
- Article
Enhancing Medical Image Security with FPGA-Accelerated LED Cryptography and LSB Watermarking.
- Published in:
- Traitement du Signal, 2024, v. 41, n. 1, p. 85, doi. 10.18280/ts.410107
- By:
- Publication type:
- Article
Chaotic Systems Based Real-Time Implementation of Visual Cryptography Using LabVIEW.
- Published in:
- Traitement du Signal, 2020, v. 37, n. 4, p. 639, doi. 10.18280/ts.370413
- By:
- Publication type:
- Article
Visual cryptography for gray scale images with enhanced security mechanisms.
- Published in:
- Traitement du Signal, 2017, v. 34, n. 3/4, p. 197, doi. 10.3166/TS.34.197-208
- By:
- Publication type:
- Article
A Tabu Search Algorithm for General Threshold Visual Cryptography Schemes.
- Published in:
- Ingénierie des Systèmes d'Information, 2021, v. 26, n. 3, p. 329, doi. 10.18280/isi.260310
- By:
- Publication type:
- Article
A Novel Image Encryption Using Parity Based Visual Cryptography.
- Published in:
- Ingénierie des Systèmes d'Information, 2021, v. 26, n. 1, p. 135, doi. 10.18280/isi.260115
- By:
- Publication type:
- Article
A Novel Approach to Key Management Using Visual Cryptography.
- Published in:
- Ingénierie des Systèmes d'Information, 2019, v. 24, n. 6, p. 627, doi. 10.18280/isi.240610
- By:
- Publication type:
- Article
Essential secret image sharing with increasable shadows.
- Published in:
- Optical Engineering, 2016, v. 55, n. 1, p. 1, doi. 10.1117/1.OE.55.1.013103
- By:
- Publication type:
- Article
Target Search for Joint Local and High-Level Semantic Information Based on Image Preprocessing Enhancement in Indoor Low-Light Environments.
- Published in:
- ISPRS International Journal of Geo-Information, 2023, v. 12, n. 10, p. 400, doi. 10.3390/ijgi12100400
- By:
- Publication type:
- Article