26
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images

, , , , &

References

  • B. Yan, Y. Xiang and G. Hua, “Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach,” in IEEE Transactions on Image Processing, vol. 28, no. 2, pp. 896-911, Feb. 2019.doi: https://doi.org/10.1109/TIP.2018.2874378
  • P. Chiu and K. Lee, “Threshold Visual Cryptography Schemes with Tagged Shares,” in IEEE Access, vol. 8, pp. 111330-111346, 2020.doi: https://doi.org/10.1109/ACCESS.2020.3000308
  • Y. Chen, “Fully Incrementing Visual Cryptography from a Succinct Non-Monotonic Structure,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1082-1091, May 2017.doi: https://doi.org/10.1109/TIFS.2016.2641378
  • C. Yang, C. Wu and Y. Lin, “$k$ Out of $n$ Region-Based Progressive Visual Cryptography,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 1, pp. 252-262, Jan. 2019.doi: https://doi.org/10.1109/TCSVT.2017.2771255
  • P. Li, J. Ma, L. Yin and Q. Ma, “A Construction Method of (2, 3) Visual Cryptography Scheme,” in IEEE Access, vol. 8, pp. 32840-32849, 2020. doi: https://doi.org/10.1109/ACCESS.2020.2973659
  • Gajanand Sharma & Dinesh Goyal (2019) Video tempering detection assessment in full reference mode using difference matrices, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 645–659, DOI: https://doi.org/10.1080/09720529.2019.1637159
  • Gajanand Sharma, Himanshu Sharma, Rajneesh Pareek, Nidhi Gour, Ravi Shanker Sharma & Ashutosh Kumar (2021) Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks, Journal of Discrete Mathematical Sciences and Cryptography, 24:8, 2221-2232, DOI: https://doi.org/10.1080/09720529.2021.2009192
  • Himanshu Sharma, Rajneesh Pareek, Ashutosh Kumar, Nidhi Gour, Ravi Shanker Sharma & Gajanand Sharma (2021) Commutative encryption-based video encoding technique with high-efficiency & videoadaptationcapabilities, JournalofDiscreteMathematicalSciencesand Cryptography, 24:8, 2207-2219, DOI: https://doi.org/10.1080/09720529.2021.2011099
  • Janu, N., Kumar, A., Dadheech, P., Sharma, G., Kumar, A., & Raja, L. (2021, April). Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. In IOP Conference Series: Materials Science and Engineering (Vol. 1131, No. 1, p. 012020). IOP Publishing.
  • Kumar, A., Sharma, G., Jain, P., Upadhyay, A., Sharma, S., & Saini, A. K. (2021). Virtual environments testing in cloud service environment: a framework to optimize the performance of virtual applications. International Journal of System Assurance Engineering and Management, 1-15.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.