共 50 条
- [1] A secret sharing scheme for EBTC using steganography [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
- [3] Sound Steganography using Shamir Secret Sharing Scheme [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
- [4] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
- [5] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme [J]. EURASIP Journal on Advances in Signal Processing, 2010
- [7] Multiple Assignment Secret Sharing Scheme Using Hierarchical Threshold Scheme [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 456 - 461
- [8] PUF Authentication using Visual Secret Sharing Scheme [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 472 - 475
- [9] A Lossless Secret Image Sharing Scheme Based on Steganography [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250