4.7 Article

Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Secret image sharing with separate shadow authentication ability

Xuehu Yan et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)

Article Computer Science, Information Systems

Threshold changeable secret image sharing scheme based on interpolation polynomial

Yan-Xiao Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

An enhanced threshold visual secret sharing based on random grids

Xuehu Yan et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)

Article Engineering, Electrical & Electronic

(k, n) secret image sharing scheme capable of cheating detection

Yan-Xiao Liu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)

Article Engineering, Electrical & Electronic

Privacy-preserving combinatorial auction without an auctioneer

Chunqiang Hu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)

Article Computer Science, Information Systems

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

Yanxiao Liu et al.

INFORMATION SCIENCES (2018)

Article Engineering, Electrical & Electronic

An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking

Tapasi Bhattacharjee et al.

MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS (2017)

Article Engineering, Electrical & Electronic

Scalable secret image sharing scheme with essential shadows

Yanxiao Liu et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2017)

Article Computer Science, Interdisciplinary Applications

Basic Visual Cryptography Using Braille

Guangyu Wang et al.

INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (2016)

Article Optics

Steganography and authentication in image sharing without parity bits

Ching-Nung Yang et al.

OPTICS COMMUNICATIONS (2012)

Article Computer Science, Artificial Intelligence

Image secret sharing method with two-decoding-options: Loss less recovery and previewing capability

Ching-Nung Yang et al.

IMAGE AND VISION COMPUTING (2010)

Article Computer Science, Hardware & Architecture

A new image secret sharing scheme to identify cheaters

Rong Zhao et al.

COMPUTER STANDARDS & INTERFACES (2009)

Article Computer Science, Software Engineering

Improvements of image sharing with steganography and authentication

Ching-Nung Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2007)

Article Computer Science, Software Engineering

Secret image sharing with steganography and authentication

CC Lin et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2004)