Author:
Chen Guohui,Wang Chunying,Yan Xuehu,Li Peng
Publisher
Springer International Publishing
Reference21 articles.
1. Li, L., El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4, 877–883 (2012)
2. Lecture Notes in Computer Science;M Naor,1995
3. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4, 383–396 (2009)
4. Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389–398 (2014)
5. Lecture Notes in Computer Science;J Weir,2010
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献