[1]
“Exploring Visual Cryptography Techniques: A Comprehensive Review”, ANJS, vol. 27, no. 3, pp. 97–108, Sep. 2024, doi: 10.22401/d8y2v967.