Author:
Geetha P.,Jayanthi V. S.,Jayanthi A. N.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference54 articles.
1. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106
2. Ateniese G, Blundo C, Santis AD, Stinson DR Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161
3. Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud University-Computer and Information Sciences
4. Barik RC, Changder S, Sahu SS (2017) Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. Computational Intelligence in Data Mining, Springer, Singapore, pp 449–458
5. Chang C, Tsai C, Chen T (2000) A new scheme for sharing secret color images in computer network. International Conference on Parallel and Distributed Systems, pp. 21–27
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献