Ramp secret image sharing
DOI10.3934/MBE.2019221zbMATH Open1497.94151OpenAlexW2945626116WikidataQ93200446 ScholiaQ93200446MaRDI QIDQ2160785FDOQ2160785
Authors: Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xian-Hua Song
Publication date: 3 August 2022
Published in: Mathematical Biosciences and Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/mbe.2019221
Chinese remainder theoremsecret image sharinglossless recoveryprogressivenessramp secret image sharing
Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- How to share a secret
- Security of Ramp Schemes
- Title not available (Why is that?)
- A modular approach to key safeguarding
- Friendly progressive visual secret sharing
- A discussion on the relationship between probabilistic visual cryptography and random grid
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
- Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing
- Visual cryptography from halftone error diffusion
- A note on ramp secret sharing schemes from error-correcting codes
This page was built for publication: Ramp secret image sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2160785)