Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Halftone Visual Cryptography with Complementary Cover Images., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 223-237. (2016)Distributed three-level QR codes based on visual cryptography scheme., , , and . J. Vis. Commun. Image Represent., (2022)Improved schemes for visual secret sharing based on random grids., , , , and . Multimedia Tools Appl., 78 (9): 12055-12082 (2019)On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares., and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 485-494. Springer, (2012)Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR Code., , , and . CIS, page 233-237. IEEE Computer Society, (2018)Security issues in visual cryptography scheme with known random number sequence., , , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (3): 101983 (2024)A map traceability management scheme for security control., , , and . Enterprise IS, 14 (3): 388-401 (2020)Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares., and . Trans. Data Hiding Multim. Secur., (2014)General Construction for Extended Visual Cryptography Scheme Using QR Codes., , , and . Int. J. Digit. Crime Forensics, 11 (1): 1-17 (2019)Improved Contrast for Threshold Random-grid-based Visual Cryptography., , , and . KSII Trans. Internet Inf. Syst., 12 (7): 3401-3420 (2018)