[1]
|
Contrast-enhanced visual cryptography schemes based on block pixel patterns
International Journal of Information Technology,
2023
DOI:10.1007/s41870-023-01286-8
|
|
|
[2]
|
Differential Privacy Made Easy
2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE),
2022
DOI:10.1109/ETECTE55893.2022.10007322
|
|
|
[3]
|
An Effective GPGPU Visual Secret Sharing by Contrast-Adaptive ConvNet Super-Resolution
Wireless Personal Communications,
2022
DOI:10.1007/s11277-021-09245-x
|
|
|
[4]
|
An enhanced color visual cryptography scheme based on the binary dragonfly algorithm
International Journal of Computers and Applications,
2022
DOI:10.1080/1206212X.2020.1859244
|
|
|
[5]
|
Differential Privacy Made Easy
2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE),
2022
DOI:10.1109/ETECTE55893.2022.10007322
|
|
|
[6]
|
An overview of visual cryptography techniques
Multimedia Tools and Applications,
2021
DOI:10.1007/s11042-021-11229-9
|
|
|
[7]
|
Enhanced Visual Cryptography: An Augmented Model for Image Security
Procedia Computer Science,
2020
DOI:10.1016/j.procs.2020.03.232
|
|
|
[8]
|
An effective secret image sharing using quantum logic and GPGPU based EDNN super-resolution
Multimedia Tools and Applications,
2020
DOI:10.1007/s11042-020-10065-7
|
|
|
[9]
|
Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1402/6/066045
|
|
|
[10]
|
Enhancement IDEA Algorithm with Digital Image as Key Encryption and Decryption
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1381/1/012043
|
|
|
[11]
|
Color image share cryptography: a novel approach
Journal of Intelligent & Fuzzy Systems,
2019
DOI:10.3233/JIFS-179002
|
|
|
[12]
|
Visual cryptography for message confidentiality
2019
DOI:10.1063/1.5097808
|
|
|
[13]
|
Secure Image Transmission in Wireless Sensor Network (WSN) Applications
Lecture Notes in Electrical Engineering,
2019
DOI:10.1007/978-3-030-20816-5_10
|
|
|
[14]
|
A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2920383
|
|
|
[15]
|
Applied Pohlig-Hellman algorithm in three-pass protocol communication
Journal of Applied Engineering Science,
2018
DOI:10.5937/jaes16-16557
|
|
|