4.7 Article

A Common Method of Share Authentication in Image Secret Sharing

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Secret image sharing with separate shadow authentication ability

Xuehu Yan et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)

Article Computer Science, Information Systems

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

Ahmed A. Abd El-Latif et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Theory & Methods

Reversible Image Secret Sharing

Xuehu Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Electrical & Electronic

k Out of n Region-Based Progressive Visual Cryptography

Ching-Nung Yang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2019)

Article Computer Science, Information Systems

A robust and secure image sharing scheme with personal identity information embedded

Ping Wang et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Distortion less secret image sharing scheme for Internet of Things system

Li Li et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

An enhanced threshold visual secret sharing based on random grids

Xuehu Yan et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)

Article Engineering, Electrical & Electronic

(k, n) secret image sharing scheme capable of cheating detection

Yan-Xiao Liu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)

Article Engineering, Electrical & Electronic

Robust Image Fingerprinting via Distortion-Resistant Sparse Coding

Yuenan Li et al.

IEEE SIGNAL PROCESSING LETTERS (2018)

Article Computer Science, Theory & Methods

Improved Visual Secret Sharing Scheme for QR Code Applications

Yuqiao Cheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Information Systems

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

Yanxiao Liu et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

A turtle shell-based visual secret sharing scheme with reversibility and authentication

Yanjun Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

On the fault-tolerant performance for a class of robust image steganography

Yi Zhang et al.

SIGNAL PROCESSING (2018)

Article Multidisciplinary Sciences

Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size

Xuan Zhou et al.

SYMMETRY-BASEL (2018)

Article Computer Science, Information Systems

Efficient Quantum Information Hiding for Remote Medical Image Sharing

Ahmed A. Abd El-Latif et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Secret Image Sharing Based on Encrypted Pixels

Zhili Zhou et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Secret-Sharing for NP

Ilan Komargodski et al.

JOURNAL OF CRYPTOLOGY (2017)

Proceedings Paper Computer Science, Hardware & Architecture

A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain

Masayuki Fukumitsu et al.

2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2017)

Article Computer Science, Interdisciplinary Applications

Basic Visual Cryptography Using Braille

Guangyu Wang et al.

INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (2016)

Article Engineering, Electrical & Electronic

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality

Xuehu Yan et al.

DIGITAL SIGNAL PROCESSING (2015)

Article Computer Science, Theory & Methods

On the Relation of Random Grid and Deterministic Visual Cryptography

Roberto De Prisco et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Information Systems

A discussion on the relationship between probabilistic visual cryptography and random grid

Ching-Nung Yang et al.

INFORMATION SCIENCES (2014)

Proceedings Paper Computer Science, Software Engineering

Visual Cryptography and Random Grids Schemes

Zheng-xin Fu et al.

DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013 (2014)

Article Computer Science, Software Engineering

Threshold visual secret sharing by random grids with improved contrast

Teng Guo et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2013)

Article Computer Science, Artificial Intelligence

Secret image sharing scheme with adaptive authentication strength

Guzin Ulutas et al.

PATTERN RECOGNITION LETTERS (2013)

Article Computer Science, Theory & Methods

Halftone Visual Cryptography Via Error Diffusion

Zhongmin Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Artificial Intelligence

Sharing secrets in stego images with authentication

Chin-Chen Chang et al.

PATTERN RECOGNITION (2008)

Article Computer Science, Software Engineering

Secret image sharing with steganography and authentication

CC Lin et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2004)