Login / Signup
Secured approach for authentication using threshold-based hierarchical visual cryptography.
Pallavi Vijay Chavan
Mohammad Atique
Published in:
Int. J. Inf. Priv. Secur. Integr. (2015)
Keyphrases
</>
visual cryptography
secret image sharing
visual cryptography scheme
secret sharing scheme
secret sharing
multiscale
image authentication
human eyes