2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068588
|View full text |Cite
|
Sign up to set email alerts
|

Review of models, issues and applications of digital watermarking based on visual cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The one-time pad is remembered by this method, as each ciphertext page is decoded by using a different transparency. The input image to the VC scheme is the watermark in combined watermarking schemes [31].…”
Section: Watermarking With (22) Vc Schemementioning
confidence: 99%
“…The one-time pad is remembered by this method, as each ciphertext page is decoded by using a different transparency. The input image to the VC scheme is the watermark in combined watermarking schemes [31].…”
Section: Watermarking With (22) Vc Schemementioning
confidence: 99%
“…This is an advantage that VC has over conventional cryptographic schemes that are usually conditionally secure. Due to its unique property, VC has various applications that include securing online transactions [86], digital watermarking [99], authentication [21,35,72], copyright protection for digital images, steganography, electronic cash banking applications [84] and many more.…”
Section: Introductionmentioning
confidence: 99%