Author:
Al-Najjar Hazem,Alharthi Saeed,Atrey Pradeep K.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference35 articles.
1. Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: Proceedings of the 2nd workshop on Multimedia in forensics, security and intelligence. ACM, pp 53–58
2. Atrey PK, Alharthi S, Anwar Hossain M, AlGhamdi A, El Saadik A (2013) Collective control over sensitive video data using secret sharing. Multimed Tools Appl. doi: 10.1007/s11042-013-1644-0.
3. Blakley GR (1899) Safeguarding cryptographic keys. In: International workshop on managing requirements knowledge. IEEE Computer Society, p 313
4. Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. J Commun 5(1):5–12
5. Chen LS-T, Su W-K, Lin J-C (2009) Secret image sharing based on vector quantization. Int J Circ Syst Signal Process 3:137–144
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design of Medical Image Cryptosystem Triggered by Fusional Chaotic Map;Intelligent Data Communication Technologies and Internet of Things;2021