Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size
暂无分享,去创建一个
[1] Ran-Zan Wang,et al. Scalable secret image sharing , 2007, Signal Process. Image Commun..
[2] Ching-Nung Yang,et al. Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD , 2018, J. Vis. Commun. Image Represent..
[3]
Ching-Nung Yang,et al.
[4] Yining Liu,et al. A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.
[5] Ching-Nung Yang,et al. A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..
[6] Ran-Zan Wang,et al. Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.
[7] Shyong Jian Shyu,et al. Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[9] Yanan Zhao,et al. Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments , 2020, IEEE Systems Journal.
[10] Shyong Jian Shyu,et al. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.
[11] Chih-Fong Tsai,et al. Block-based progressive visual secret sharing , 2013, Inf. Sci..
[12] Nan Wang,et al. Identification of Influential Online Social Network Users Based on Multi-Features , 2016, Int. J. Pattern Recognit. Artif. Intell..
[13] Nan Wang,et al. Local spatial obesity analysis and estimation using online social network sensors , 2018, J. Biomed. Informatics.
[14] Ching-Nung Yang,et al. Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..
[15] Ching-Nung Yang,et al. Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes , 2018, Signal Process. Image Commun..
[16] Jianfeng Ma,et al. Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept , 2018, Sensors.
[17] Chien-Ming Chen,et al. A provably secure certificateless public key encryption with keyword search , 2019, Journal of the Chinese Institute of Engineers.
[18] Chien-Ming Chen,et al. Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.
[19] Ching-Nung Yang,et al. Constructions and properties of k out of n scalable secret image sharing , 2010 .
[20] Yang Liu,et al. A machine learning-based scheme for the security analysis of authentication and key agreement protocols , 2018, Neural Computing and Applications.
[21] W. Marsden. I and J , 2012 .
[22] Hao Zhang,et al. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..
[23] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.
[25] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[26] Yuliang Lu,et al. Greyscale-images-oriented progressive secret sharing based on the linear congruence equation , 2017, Multimedia Tools and Applications.
[27] Ching-Nung Yang,et al. A general multi-secret visual cryptography scheme , 2010 .
[28] Yang Liu,et al. Lightweight Privacy-Preserving Ensemble Classification for Face Recognition , 2019, IEEE Internet of Things Journal.
[29] Jiamin Wang,et al. Node importance evaluation method in wireless sensor network based on energy field model , 2016, EURASIP J. Wirel. Commun. Netw..
[30] Li Liu,et al. Secret sharing: using meaningful image shadows based on Gray code , 2016, Multimedia Tools and Applications.
[31] Aversa,et al. General k , 1994, Physical review. B, Condensed matter.
[32] Chien-Ming Chen,et al. Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications , 2018, Journal of Ambient Intelligence and Humanized Computing.
[33] Jianfeng Ma,et al. A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms , 2019, IEEE Access.