User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 7
Visual Cryptography
2021
Journal:  
Turkish Online Journal of Qualitative Inquiry
Author:  
Abstract:

As the use of the web over the world has enlarged to a high level, the safe transmission of the information has become tougher. the protection of the information and data is incredibly necessary for each individual. this is often the explanation why researchers are perpetually concerned in developing new technologies for safe transmission of the information over the web. Several cryptography techniques are discovered and therefore the add this field is sort of unending. one of the best techniques is Visual cryptography. it's a crypto logic technique within which the human sensory system is accountable for the decoding of the visual data, be it an image, text, etc. Visual Cryptography could be an immense space of analysis and is employed in I information activity, color imaging securing I pictures, and different such fields. Here, we tend to aim to look towards a complicated version of cryptography named Visual Cryptography. I Visual I Cryptography came up as a singular secret writing method for data security. It uses pictures rather than texts. An awfully special feature of this method is that the decoding of the encrypted image is finished via the human vision only if I the I right key of image is used. The secret image is reworked into many I share pictures during this procedure. These I shared pictures are I meaningful however distorted. the original image I may be recovered by the union of those shared pictures.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Online Journal of Qualitative Inquiry

Field :   Eğitim Bilimleri

Journal Type :   Uluslararası

Metrics
Article : 4.283
Cite : 1.160
2023 Impact : 0.002
Turkish Online Journal of Qualitative Inquiry