Author:
Selva Mary G.,Manoj Kumar S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference32 articles.
1. Banik BG, Bandyopadhyay SK (2015) Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, p 1147-1152.
https://doi.org/10.1109/CICN.2015.223
2. Beimel (2011) Secret-sharing schemes: a survey. Proc. 3rd Int. Workshop Coding Cryptol. (IWCC), 6639:11-46
3. Blesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. 2013 Fifth International Conference on Advanced Computing (ICoAC), Chennai, p 560-564.
https://doi.org/10.1109/ICoAC.2013.6922012
4. Blundo C, De Santis A (1999) Visual cryptography schemes with perfect reconstruction of black pixels. J. Computers Graphics, Special issue: “Data Security in Image Communication and Networking.” 22(4):449–455
5. Blundo C, D’Arco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16(2):224–261
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献