[1]
“Exploring Visual Cryptography Techniques: A Comprehensive Review”,
ANJS
, vol. 27, no. 3, pp. 97–108, Sep. 2024, doi:
10.22401/d8y2v967
.