Author:
Chen Chien-Chang,Wu Wei-Jie,Chen Jun-Long
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference25 articles.
1. Chen J, Chen YS, Hsu HC, Chen HW (2005) New visual cryptography system based on circular shadow image and fixed angle segmentation. J Electron Imaging 14:033018-1–033018-5
2. Chen CC, Fu WY (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24:1567–1577
3. Chen CC, Huang JY (2014) Progressive share of secret audio by Chinese remainder theorem and integer wavelet transform. Int J Electron Commerce Stud 5:219–232
4. Chen CC, Liu CA (2013) Tamper-Proof secret image sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22:013008-1–013008-7
5. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91:90–97
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献