Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference62 articles.
1. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Applic 78(7):8603–8633
2. Bahramian M, Eslami K (2017) An efficient threshold verifiable multi-secret sharing scheme using generalized Jacobian of elliptic curves. Algebraic Struct Applic 4(2):45–55
3. Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2020) Accountable privacy-preserving attribute based framework for authenticated encrypted access in clouds. J Parallel Distrib Comput 135:1–20
4. Blakley GR (1979) Safeguarding cryptographic keys. In: 1979 International workshop on managing requirements knowledge (MARK). IEEE, pp 313–318
5. Chang CC, Lin CC, Lin CH, Chen YH (2008) A novel secret image sharing scheme in color images using small shadow images. Inform Sci 178 (11):2433–2447
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献