-
21Published 2017Table of Contents: “… based on RS and SVM -- Particle Swarm Optimization based Image Enhancement of Visual Cryptography Shares…”
Full Text via HEAL-Link
Electronic eBook -
22Published 2019Table of Contents: “… Thresholding in Direct Binary Search Visual Cryptography For Enhanced Bank Locker System.…”
Full Text via HEAL-Link
Electronic eBook -
23Published 2019Table of Contents: “… for Enhancement of Visual Cryptography Images -- Plant phenotyping through Image analysis using nature inspired…”
Full Text via HEAL-Link
Electronic eBook -
24Published 2007Table of Contents: “… with Compact ANF Representation -- Visual Cryptography Methods as a Source of Trustworthiness for the Signature…”
Full Text via HEAL-Link
Electronic eBook -
25Published 2016Table of Contents: “…Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New…”
Full Text via HEAL-Link
Electronic eBook -
26
-
27
-
28Published 2019Table of Contents: “…Part 1.Computational Intelligence -- Chapter 1.A Hierarchical Image Cryptosystem Based on Visual…”
Full Text via HEAL-Link
Electronic eBook -
29Published 2018Table of Contents: “… Sensing Magnetic Resonance Image Reconstruction -- An approach for Visual Cryptography Scheme on Color…”
Full Text via HEAL-Link
Electronic eBook -
30Published 2016Table of Contents: “… -- Developing Visual Cryptography for Authentication on Smartphones -- A Scale-Free Network Model for Wireless…”
Full Text via HEAL-Link
Electronic eBook -
31Published 2016Table of Contents: “… 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual…”
Full Text via HEAL-Link
Electronic eBook -
32
-
33Published 2012Table of Contents: “… -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted…”
Full Text via HEAL-Link
Electronic eBook -
34Published 2005Table of Contents: “…-Matrix Generalized Linear Complementarity Problems -- Visual Cryptography and Computational Geometry…”
Full Text via HEAL-Link
Electronic eBook -
35Published 2009Table of Contents: “… Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual…”
Full Text via HEAL-Link
Electronic eBook -
36Published 2005Table of Contents: “… Signcryption from q-Diffie-Hellman Problems -- Distributed Cryptography -- Colored Visual Cryptography Without…”
Full Text via HEAL-Link
Electronic eBook -
37Published 2016Table of Contents: “… Framework Based on Visual Cryptography -- Are the days of Field-to-Laboratory Analysis Gone? -- Effects…”
Full Text via HEAL-Link
Electronic eBook -
38Published 2007Table of Contents: “… Threshold Decryption Revisited -- Visual Cryptography Schemes with Dihedral Group Access Structure for Many…”
Full Text via HEAL-Link
Electronic eBook -
39Published 2000Table of Contents: “… Core Predicates -- Randomness in Visual Cryptography -- Online Dial-a-Ride Problems: Minimizing…”
Full Text via HEAL-Link
Electronic eBook -
40Published 2008Table of Contents: “… Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable…”
Full Text via HEAL-Link
Electronic eBook