Publisher
Springer Science and Business Media LLC
Reference50 articles.
1. Baghel SS, Goyal A (2016) Improved the security strength of visual cryptography using feature-based watermarking technique. Int J Comput Appl 153(11):9–13
2. Banik BG, Bandyopadhyay SK (2015) Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: Computational Intelligence and Communication Networks (CICN), 2015 International Conference on IEEE, pp 1147–1152
3. Challa R, Vijayakumar G, Sunny B (2015). Secure image processing using LWE based homomorphic encryption. In: Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on IEEE, pp 1–6
4. Dardzinska-Glebocka A (2007) Optimization algorithm and data security problem in distributed information systems. In: Signal-image technologies and internet-based system, 2007. SITIS’07. Third International IEEE Conference on IEEE, pp 116–120
5. Dasgupta S, Pal SK (2016) Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect Sci 8:692–695
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献