Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Lecture Notes in Computer Science;M Naor,1995
2. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
3. Blakley, G.R.: Safeguarding cryptographic keys. In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) National Computer Conference, vol. 48, pp. 242–268. IEEE, New York (1979)
4. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)
5. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);C-S Hsu,2006
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fake and Dishonest Participant Immune Secret Image Sharing;ACM Transactions on Multimedia Computing, Communications, and Applications;2023-02-27
2. Image Secret Sharing using IWT (Integer Wavelet Transform) Algorithm;International Journal of Advanced Research in Science, Communication and Technology;2022-06-12
3. Practical Secret Image Sharing Based on the Chinese Remainder Theorem;Mathematics;2022-06-07
4. Multiparty verification in image secret sharing;Information Sciences;2021-07
5. Applying Secret Image Sharing to Economics;International Journal of Digital Crime and Forensics;2021-07