Related references
Note: Only part of the references are listed.Secret image sharing with separate shadow authentication ability
Xuehu Yan et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)
Threshold changeable secret image sharing scheme based on interpolation polynomial
Yan-Xiao Liu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
An enhanced threshold visual secret sharing based on random grids
Xuehu Yan et al.
JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)
(k, n) secret image sharing scheme capable of cheating detection
Yan-Xiao Liu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)
Privacy-preserving combinatorial auction without an auctioneer
Chunqiang Hu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
Yanxiao Liu et al.
INFORMATION SCIENCES (2018)
An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking
Tapasi Bhattacharjee et al.
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS (2017)
Scalable secret image sharing scheme with essential shadows
Yanxiao Liu et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2017)
Basic Visual Cryptography Using Braille
Guangyu Wang et al.
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (2016)
Steganography and authentication in image sharing without parity bits
Ching-Nung Yang et al.
OPTICS COMMUNICATIONS (2012)
Image secret sharing method with two-decoding-options: Loss less recovery and previewing capability
Ching-Nung Yang et al.
IMAGE AND VISION COMPUTING (2010)
A new image secret sharing scheme to identify cheaters
Rong Zhao et al.
COMPUTER STANDARDS & INTERFACES (2009)
Improvements of image sharing with steganography and authentication
Ching-Nung Yang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2007)
Secret image sharing with steganography and authentication
CC Lin et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2004)