ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cryptographic and Information Security
Latest Publications
TOTAL DOCUMENTS
31
(FIVE YEARS 0)
H-INDEX
1
(FIVE YEARS 0)
Published By CRC Press
9780429435461
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)
Cryptographic and Information Security
◽
10.1201/9780429435461-6
◽
2018
◽
pp. 141-170
Author(s):
Piyush Raghav
◽
Amit Dua
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
Download Full-text
Phase Retrieval in Optical Cryptography
Cryptographic and Information Security
◽
10.1201/9780429435461-5
◽
2018
◽
pp. 123-140
Author(s):
Naveen Kumar Nishchal
◽
Areeba Fatima
Keyword(s):
Phase Retrieval
Download Full-text
Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method
Cryptographic and Information Security
◽
10.1201/9780429435461-26
◽
2018
◽
pp. 773-797
Author(s):
Zahra Hossein-Nejad
◽
Mehdi Nasri
Keyword(s):
Forgery Detection
◽
Elimination Method
◽
Image Forgery
◽
Image Forgery Detection
Download Full-text
Review of Image Tampering Detection Techniques
Cryptographic and Information Security
◽
10.1201/9780429435461-24
◽
2018
◽
pp. 723-744
Author(s):
V. T. Manu
◽
B. M. Mehtre
Keyword(s):
Tampering Detection
◽
Detection Techniques
◽
Image Tampering
◽
Image Tampering Detection
Download Full-text
Visual Secret Sharing Scheme for ( k , n ) Threshold-Based on QR Code with Multiple Decryptions
Cryptographic and Information Security
◽
10.1201/9780429435461-20
◽
2018
◽
pp. 571-596
◽
Cited By ~ 1
Author(s):
Song Wan
◽
Yuliang Lu
◽
Xuehu Yan
◽
Yongjie Wang
◽
Chao Chang
Keyword(s):
Secret Sharing
◽
Qr Code
◽
Secret Sharing Scheme
◽
Visual Secret Sharing
◽
Sharing Scheme
◽
Multiple Decryptions
Download Full-text
Robust Image Watermarking Based on Multiple-Criteria Decision-Making
Cryptographic and Information Security
◽
10.1201/9780429435461-15
◽
2018
◽
pp. 407-440
Author(s):
Musab Ghadi
◽
Lamri Laouamer
◽
Laurent Nana
◽
Anca Pascu
Keyword(s):
Decision Making
◽
Image Watermarking
◽
Multiple Criteria Decision Making
◽
Multiple Criteria
◽
Robust Image
Download Full-text
Data Hiding in Compressed Images and Videos
Cryptographic and Information Security
◽
10.1201/9780429435461-14
◽
2018
◽
pp. 379-406
Author(s):
Shaohui Liu
Keyword(s):
Data Hiding
◽
Compressed Images
Download Full-text
Biometrics-Based Authentication Scheme for Cloud Environment
Cryptographic and Information Security
◽
10.1201/9780429435461-31
◽
2018
◽
pp. 917-944
Author(s):
G. Jaspher Willsie Kathrine
Keyword(s):
Authentication Scheme
◽
Cloud Environment
Download Full-text
Secure Biometric Modalities for Effective Communication
Cryptographic and Information Security
◽
10.1201/9780429435461-29
◽
2018
◽
pp. 855-885
Author(s):
Sandhya Tarar
Keyword(s):
Effective Communication
Download Full-text
Steganography Based on Interpolation and Edge Detection Techniques
Cryptographic and Information Security
◽
10.1201/9780429435461-21
◽
2018
◽
pp. 597-626
Author(s):
Ki-Hyun Jung
Keyword(s):
Edge Detection
◽
Detection Techniques
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close