Author:
Goon Surajit,Pal Debdutta,Dihidar Souvik,Roy Subham
Publisher
Springer Nature Singapore
Reference15 articles.
1. M. Naor, A. Shamir, Visual cryptography, in Proceedings of Euro Crypt 1994, Lecture Notes in Computer Science, vol. 950, pp. 1–12 (1994). http://dx.doi.org/https://doi.org/10.1007/bfb0053419
2. B.K. Sapna, K.L. Sudha, Efficient visual cryptographic algorithm using AES and modified (K, N) share generation technique. Int. J. Sci. Technol. Res. 8(12), 2135–2141 (2019). ISSN 2277-8616
3. S. Goon, D. Pal, S. Dihidar, Distribution of internet banking credentials using visual cryptography and watermarking techniques, vol. 291, in Cyber Intelligence and Information Retrieval. Lecture Notes in Networks and Systems, eds. by J.M.R.S. Tavares, P. Dutta, S. Dutta, D. Samanta (Springer, Singapore, 2022), pp. 59–67. https://doi.org/10.1007/978-981-16-4284-5_6
4. S. Goon, Major developments in visual cryptography. Int. J. Eng. Adv. Technol. 9(1S6), 81–88 (2019). https://doi.org/10.35940/ijeat.A1016.1291S619
5. B. Bryce, An optimum method for two-level rendition of continuous-tone pictures (PDF). IEEE Int. Conf. Commun. 1, 11–15 (1973)