Author:
Muhammed Ajnas,Pais Alwyn Roshan
Publisher
Springer International Publishing
Reference17 articles.
1. Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recogn. 42(9), 2203–2217 (2009)
2. Divya, C., Surya, E.: Visual cryptography using palm print based on dct algorithm. Int. J. Emerg. Technol. Adv. Eng. 2(12), 2250–2459 (2012)
3. Elad, M., Feuer, A.: Restoration of a single superresolution image from several blurred, noisy, and undersampled measured images. IEEE Trans. Image Process. 6(12), 1646–1658 (1997)
4. Kho, J.B., Kim, J., Kim, I.J., Teoh, A.B.: Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn. 91, 245–260 (2019)
5. Li, C., Hu, J.: Attacks via record multiplicity on cancelable biometrics templates. Concurr. Comput. Pract. Exp. 26(8), 1593–1605 (2014)