Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference36 articles.
1. Abdulla A A (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. Thesis, University of Buckingham
2. Ateniese G, Blundo C, De Santis A, Stinson D R (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106
3. Cheng Y, Fu Z, Yu B (2018) Improved visual secret sharing scheme for QR code applications. IEEE Trans Inf Forensic Secur 13(9):2393–2403
4. Chiu P-L, Lee K-H (2019) Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165:233–249
5. Chow Y-W, Susilo W, Yang G, Phillips J G, Pranata I, Barmawi A M (2016) Exploiting the error correction mechanism in QR codes for secret sharing. In: Australasian conference on information security and privacy. Springer, pp 409–425
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献