Author:
Jisha T. E.,Monoth Thomas
Publisher
Springer Nature Singapore
Reference24 articles.
1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (Ed.) Advances in Cryptology—EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
2. Pandey, D., Kumar, A., Singh, Y.: Feature and future of visual cryptography based schemes. In: Singh, K., Awasthi, A.K. (Eds.) QShine 2013. LNICST, vol. 115, pp. 816–830. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37949-9_71
3. Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: 10th International Conference on Information Technology (ICIT 2007), Orissa, 2007, pp. 41–43. IEEE Xplore. https://doi.org/10.1109/ICIT.2007.32
4. Monoth, T.: Contrast-enhanced recursive visual cryptography scheme based on additional basis matrices. In: Smart Intelligent Computing and Applications, vol. 105, pp.179–187. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1927-3_18
5. Monoth, T., Babu Anto, P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes, Ph. D. thesis, Kannur University, Kerala, India (2012). http://shodhganga.inflibnet.ac.in