Fake and dishonest participant location scheme in secret image sharing
From MaRDI portal
Publication:1981244
DOI10.3934/MBE.2021126zbMath1472.94010OpenAlexW3138063006MaRDI QIDQ1981244
Lei Sun, Xuehu Yan, Jinrui Liu, Jingju Liu
Publication date: 10 September 2021
Published in: Mathematical Biosciences and Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/mbe.2021126
Chinese remainder theoremvisual secret sharingsecret image sharinghigh-efficiency shadows generationshadow authentication
Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Sharing secrets in stego images with authentication
- A compressed secret image sharing method with shadow image verification capability
- How to share a secret
- Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
- A Closed-Form Robust Chinese Remainder Theorem and Its Performance Analysis
- Applied Cryptography and Network Security
- An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
- Compressed sensing
This page was built for publication: Fake and dishonest participant location scheme in secret image sharing