Showing 21 - 40 results of 68 for search '"visual cryptography"', query time: 0.11s Refine Results
  1. 21
    Published 2017
    Table of Contents: “… based on RS and SVM -- Particle Swarm Optimization based Image Enhancement of Visual Cryptography Shares…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 22
    Published 2019
    Table of Contents: “… Thresholding in Direct Binary Search Visual Cryptography For Enhanced Bank Locker System.…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 23
    Published 2019
    Table of Contents: “… for Enhancement of Visual Cryptography Images -- Plant phenotyping through Image analysis using nature inspired…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 24
    Published 2007
    Table of Contents: “… with Compact ANF Representation -- Visual Cryptography Methods as a Source of Trustworthiness for the Signature…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 25
    Published 2016
    Table of Contents: “…Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 26
    by Yan, Wei Qi
    Published 2016
    Full Text via HEAL-Link
    Electronic eBook
  7. 27
  8. 28
    Published 2019
    Table of Contents: “…Part 1.Computational Intelligence -- Chapter 1.A Hierarchical Image Cryptosystem Based on Visual…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 29
    Published 2018
    Table of Contents: “… Sensing Magnetic Resonance Image Reconstruction -- An approach for Visual Cryptography Scheme on Color…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 30
    Published 2016
    Table of Contents: “… -- Developing Visual Cryptography for Authentication on Smartphones -- A Scale-Free Network Model for Wireless…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 31
    Published 2016
    Table of Contents: “… 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 32
  13. 33
    Published 2012
    Table of Contents: “… -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 34
    Published 2005
    Table of Contents: “…-Matrix Generalized Linear Complementarity Problems -- Visual Cryptography and Computational Geometry…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 35
    Published 2009
    Table of Contents: “… Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 36
    Published 2005
    Table of Contents: “… Signcryption from q-Diffie-Hellman Problems -- Distributed Cryptography -- Colored Visual Cryptography Without…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 37
    Published 2016
    Table of Contents: “… Framework Based on Visual Cryptography -- Are the days of Field-to-Laboratory Analysis Gone? -- Effects…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 38
    Published 2007
    Table of Contents: “… Threshold Decryption Revisited -- Visual Cryptography Schemes with Dihedral Group Access Structure for Many…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 39
    Published 2000
    Table of Contents: “… Core Predicates -- Randomness in Visual Cryptography -- Online Dial-a-Ride Problems: Minimizing…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 40
    Published 2008
    Table of Contents: “… Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search