17
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Image processing based techniques for securing documents

&
Pages 113-129 | Published online: 03 Jun 2013

References

  • Denning , D. E. 1982 . Cryptography and Data Security , Massachusetts : Addison – Wesley .
  • Beker , Henry and Piper , Fred . 1982 . Cipher Systems: The Protection of Communication , Northwood .
  • Rueppel , R. A. 1986 . Analysis and Design of Stream Ciphers , Springer-Verlag .
  • Naor , Moni and Shamir , Adi . “ Visual Cryptography ” . In Advances in Cryptology, EUROCRYPT 94 1 – 12 . in
  • Matias , Yossi and Shamir , Adi . “ A Video Scrambling Technique Based on Space Filling Curves ” . In Proc. CRYPTO 87 398 – 417 .
  • Bourbakis , N. and Alexopoulos , C. 1992 . Picture Data Encryption Using Scan Patterns . Pattern Recognition , 25 ( 6 ) : 567 – 581 .
  • Schwartz , Charles . 1991 . New Graphical Method for Encryption of Computer Data . Cryptologia , XV ( 1 ) : 43 – 46 .
  • Jain , Anil K. 1995 . Fundamentals of Digital Image Processing , Printice Hall of India .
  • Hearn , Donald and Pauline Baker , M. 1984 . Computer Graphics , New Jersey : Prentice Hall .
  • Peitgen , Jtrgens and Saupe . 1992 . Chaos and Fractals , 94 – 105 . Springer-Verlag . in

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.