Practical Secret Image Sharing Based on the Chinese Remainder Theorem
暂无分享,去创建一个
[1] Chih-Hsien Hsia,et al. Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction , 2021, J. Imaging.
[2] Ching-Nung Yang,et al. Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.
[3] Yuliang Lu,et al. Chinese remainder theorem-based two-in-one image secret sharing with three decoding options , 2018, Digit. Signal Process..
[4] Song Wan,et al. Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold , 2017, ICCCS.
[5] Yuliang Lu,et al. Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).
[6] Ting-Wei Chuang,et al. Image Sharing and Recovering Based on Chinese Remainder Theorem , 2016, 2016 International Symposium on Computer, Consumer and Control (IS3C).
[7] Peng Li,et al. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography , 2016, Journal of Real-Time Image Processing.
[8] Himanshu S. Mazumdar,et al. Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology , 2015 .
[9] Xuehu Yan,et al. Meaningful visual secret sharing based on error diffusion and random grids , 2015, Multimedia Tools and Applications.
[10] Ferucio Laurentiu Tiplea,et al. On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme , 2018, IACR Cryptol. ePrint Arch..
[11] Bin Yu,et al. Visual Cryptography and Random Grids Schemes , 2013, IWDW.
[12] Ching-Nung Yang,et al. Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..
[13] Feng Liu,et al. Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..
[14] Xiaofeng Liao,et al. Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..
[15] Ching-Nung Yang,et al. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..
[16] Vasif V. Nabiyev,et al. A new secret image sharing technique based on Asmuth Bloom's scheme , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[17] Shyong Jian Shyu,et al. Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[18] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[19] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.
[20] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.