Search

Your search keyword '"VISUAL cryptography"' showing total 2,636 results

Search Constraints

Start Over You searched for: Descriptor "VISUAL cryptography" Remove constraint Descriptor: "VISUAL cryptography"
2,636 results on '"VISUAL cryptography"'

Search Results

1. Universal share-based two-in-one multi-image secret sharing scheme by rotating random grids.

2. Border Collie Shuffled Shepherd optimization-based image reconstruction using visual cryptography.

3. SECURE DIGITAL DATA VISUAL SHARING SCHEMES IN MULTI-OWNER PUBLIC CLOUD ENVIRONMENT APPLICATIONS.

4. Universal share-based two-in-one multi-image secret sharing scheme by rotating random grids

5. 份额重构的变方向灰度渐进视觉密码.

6. Exploring recent advances in random grid visual cryptography algorithms.

7. Enhancing Security of Image Steganography using Visual Cryptography.

8. A (t, n) threshold quantum image secret sharing scheme.

9. A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques.

10. Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations.

11. Exploring Visual Cryptography Techniques: A Comprehensive Review.

12. Visual image encryption based on compressed sensing and Cycle-GAN.

13. A Survey on Reversible Data Hiding for Uncompressed Images.

14. Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA.

15. Image Cryptography Based on Confusion and Diffusion Using 6D Hyper Chaotic System and Fibonacci Q-matrix.

18. Visual cryptography based on chaotic logistic map in multi-cloud.

20. Enhancing Security of the Healthcare Sector using Visual Cryptography.

21. Investigation of preference for local and global processing of Capuchin-monkeys (Sapajus spp.) in shape discrimination of mosaic arrangements.

22. Enhanced block based progressive visual secret sharing scheme for grayscale and color image.

23. Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus.

24. Hiding EPR and watermark in medical images using repeated pixel differencing.

25. Robust 3D object watermarking scheme using shape features for copyright protection.

26. A review of steganography techniques.

27. Visual cryptography For(3,3) color scheme.

28. Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography

29. On Multi-image Random Grids by Arbitrary Transformations

30. A Self-Authenticating Multi-Tone Secret Sharing Scheme Using Meaningful Shares for Satellite Images

31. Cloud Data Storage Confidentiality Using Steganography and Visual Cryptography: A Review

32. Hyperchaotic technology-based efficient image encryption algorithm an overview.

33. Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols

34. Progressive meaningful visual cryptography for secure communication of grayscale medical images.

35. LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$({t,s,k,n})$ ‐ VESIS).

36. On Multi-image Random Grids by Arbitrary Transformations.

37. GeoViewMatch: A Multi-Scale Feature-Matching Network for Cross-View Geo-Localization Using Swin-Transformer and Contrastive Learning.

38. Orientation-invariant autoencoders learn robust representations for shape profiling of cells and organelles.

39. RG-Based Region Incrementing Visual Cryptography with Abilities of OR and XOR Decryption.

40. Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography.

41. A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks.

42. Quantum secret sharing protocol through noisy channel with application in visual cryptography.

43. Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography.

44. Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization.

45. Visual creativity through concept combination using quantum cognitive models.

46. Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction.

47. Language-guided Residual Graph Attention Network and Data Augmentation for Visual Grounding.

49. Visual Cryptography: An Emerging Technology

50. Digital Watermarking Using Visual Cryptography

Catalog

Books, media, physical & digital resources