A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
暂无分享,去创建一个
[1] Mervat Ahmed,et al. Secret Image Sharing Based on Elementary Cellular Automata , 2017, AISI.
[2] Chin-Chen Chang,et al. A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding , 2017, Int. J. Netw. Secur..
[3] Malrey Lee,et al. A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .
[4] Jing Zhang,et al. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds , 2018, IEEE Communications Magazine.
[5] Arambam Neelima,et al. A survey paper on secret image sharing schemes , 2018, International Journal of Multimedia Information Retrieval.
[6] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[7] Ye Liu,et al. Internet of Things for Noise Mapping in Smart Cities: State of the Art and Future Directions , 2020, IEEE Network.
[8] Mingwu Zhang,et al. Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems , 2018, ACISP.
[9] Mohammad Ebrahim Shiri,et al. A cellular automata-based multi-stage secret image sharing scheme , 2018, Multimedia Tools and Applications.
[10] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[11] Vasif V. Nabiyev,et al. Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..
[12] Tzung-Her Chen,et al. Multiple secret image sharing with general access structure , 2020, Multimedia Tools and Applications.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[15] Ahmed A. Abd El-Latif,et al. Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.
[16] Li Bai,et al. A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.
[17] Sabrina Sicari,et al. 5G In the internet of things era: An overview on security and privacy challenges , 2020, Comput. Networks.
[18] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[19] Li Bai. A Reliable (k, n) Image Secret Sharing Scheme , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[20] Yuliang Lu,et al. Secret image sharing with separate shadow authentication ability , 2020, Signal Process. Image Commun..
[21] Xinping Guan,et al. 5G Enabled Codesign of Energy-Efficient Transmission and Estimation for Industrial IoT Systems , 2018, IEEE Transactions on Industrial Informatics.
[22] Ramón Alonso-Sanz,et al. Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .
[23] N F Azzahra,et al. Verifiable Image Secret Sharing Using Matrix Projection , 2018 .
[24] Roger Piqueras Jover,et al. Challenges and Novel Solutions for 5G Network Security, Privacy and Trust , 2020, IEEE Wirel. Commun..
[25] Ching-Nung Yang,et al. Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.
[26] Vasif V. Nabiyev,et al. Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..
[27] Li Bai,et al. A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[28] Chin-Chen Chang,et al. A turtle shell-based visual secret sharing scheme with reversibility and authentication , 2018, Multimedia Tools and Applications.
[29] Li Bai,et al. A Reliable (K, N) Image Secret Sharing Scheme with Low Information Overhead , 2010 .
[30] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[31] Alimohammad Latif,et al. An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..
[32] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[33] Yuliang Lu,et al. Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.
[34] Lei Zhu,et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..