A new approach for visual cryptography
From MaRDI portal
Recommendations
Cited in
(25)- New Results on Visual Cryptography
- Visual cryptography schemes with optimal pixel expansion
- Hierarchical visual secret sharing scheme using steganography
- Shift visual cryptography scheme of two secret images.
- Visual cryptography based watermarking
- Verifiable visual cryptography based on group structure
- Bounds for visual cryptography schemes
- scientific article; zbMATH DE number 6741951 (Why is no real title available?)
- A new definition of the contrast of visual cryptography scheme
- scientific article; zbMATH DE number 6741950 (Why is no real title available?)
- Flexible Visual Cryptography Scheme and Its Application
- Authentication in Insecure Environments
- The alignment problem of visual cryptography schemes
- On the equivalence of two definitions of visual cryptography scheme
- Visual cryptography for image processing and security. Theory, methods, and applications
- scientific article; zbMATH DE number 6741952 (Why is no real title available?)
- Quantum meaningful visual cryptography
- How to say yes, no and maybe with visual cryptography
- Coloured visual cryptography using fixed size meaningful share
- scientific article; zbMATH DE number 1728663 (Why is no real title available?)
- scientific article; zbMATH DE number 2058633 (Why is no real title available?)
- High-entropy visual identification for touch screen devices
- Visual cryptography based on ghost imaging and Hadamard transform
- A study for security of visual cryptography
- Comment on “Cheating Prevention in Visual Cryptography”
This page was built for publication: A new approach for visual cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1866015)