Related references
Note: Only part of the references are listed.Secret image sharing with separate shadow authentication ability
Xuehu Yan et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)
Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities
Yue Jiang et al.
MATHEMATICS (2020)
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
Ahmed A. Abd El-Latif et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)
Reversible Image Secret Sharing
Xuehu Yan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
k Out of n Region-Based Progressive Visual Cryptography
Ching-Nung Yang et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2019)
A robust and secure image sharing scheme with personal identity information embedded
Ping Wang et al.
COMPUTERS & SECURITY (2019)
Distortion less secret image sharing scheme for Internet of Things system
Li Li et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
An enhanced threshold visual secret sharing based on random grids
Xuehu Yan et al.
JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)
(k, n) secret image sharing scheme capable of cheating detection
Yan-Xiao Liu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)
Robust Image Fingerprinting via Distortion-Resistant Sparse Coding
Yuenan Li et al.
IEEE SIGNAL PROCESSING LETTERS (2018)
Improved Visual Secret Sharing Scheme for QR Code Applications
Yuqiao Cheng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification
Xiang Zhang et al.
IEEE TRANSACTIONS ON MULTIMEDIA (2018)
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
Yanxiao Liu et al.
INFORMATION SCIENCES (2018)
A turtle shell-based visual secret sharing scheme with reversibility and authentication
Yanjun Liu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
On the fault-tolerant performance for a class of robust image steganography
Yi Zhang et al.
SIGNAL PROCESSING (2018)
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size
Xuan Zhou et al.
SYMMETRY-BASEL (2018)
Efficient Quantum Information Hiding for Remote Medical Image Sharing
Ahmed A. Abd El-Latif et al.
IEEE ACCESS (2018)
Secret Image Sharing Based on Encrypted Pixels
Zhili Zhou et al.
IEEE ACCESS (2018)
Secret-Sharing for NP
Ilan Komargodski et al.
JOURNAL OF CRYPTOLOGY (2017)
A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain
Masayuki Fukumitsu et al.
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2017)
Basic Visual Cryptography Using Braille
Guangyu Wang et al.
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (2016)
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
Xuehu Yan et al.
DIGITAL SIGNAL PROCESSING (2015)
On the Relation of Random Grid and Deterministic Visual Cryptography
Roberto De Prisco et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
A discussion on the relationship between probabilistic visual cryptography and random grid
Ching-Nung Yang et al.
INFORMATION SCIENCES (2014)
Visual Cryptography and Random Grids Schemes
Zheng-xin Fu et al.
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013 (2014)
Threshold visual secret sharing by random grids with improved contrast
Teng Guo et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2013)
Secret image sharing scheme with adaptive authentication strength
Guzin Ulutas et al.
PATTERN RECOGNITION LETTERS (2013)
Halftone Visual Cryptography Via Error Diffusion
Zhongmin Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Sharing secrets in stego images with authentication
Chin-Chen Chang et al.
PATTERN RECOGNITION (2008)
Secret image sharing with steganography and authentication
CC Lin et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2004)