SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM
From MaRDI portal
Publication:2902633
DOI10.1142/S0219691312500233zbMath1277.94057OpenAlexW2027387656MaRDI QIDQ2902633
Chunqiang Hu, Xiaofeng Liao, Di Xiao
Publication date: 22 August 2012
Published in: International Journal of Wavelets, Multiresolution and Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0219691312500233
Nontrigonometric harmonic analysis involving wavelets and other special systems (42C40) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- A multisecret sharing scheme for color images based on cellular automata
- An explication of secret sharing schemes
- Bit-level based secret sharing for image encryption
- Threshold cryptography based on Asmuth-Bloom secret sharing
- How to share a secret
- ROBUST WATERMARKING SCHEMES USING SELECTIVE CURVELET COEFFICIENTS BASED ON A HVS MODEL
- PERFORMANCE IMPROVEMENT IN SPREAD SPECTRUM IMAGE WATERMARKING USING WAVELETS
- A ROBUST WATERMARKING SCHEME USING SELECTIVE CURVELET COEFFICIENTS
- A NEW CONTOURLET-DOMAIN BASED IMAGE WATERMARKING SCHEME RESILIENT TO GEOMETRICAL ATTACKS
This page was built for publication: SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM