A verifiable secret image sharing scheme based on compressive sensing
DOI10.1007/S11859-018-1313-2zbMATH Open1424.94078OpenAlexW2804059437WikidataQ129798340 ScholiaQ129798340MaRDI QIDQ5384341FDOQ5384341
Authors: Xinyan Li, Di Xiao, Huajian Mou, Rui Zhang
Publication date: 21 June 2019
Published in: Wuhan University Journal of Natural Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11859-018-1313-2
Recommendations
- A compressed secret image sharing method with shadow image verification capability
- Sharing a verifiable secret image using two shadows
- scientific article; zbMATH DE number 2036467
- A novel secret sharing scheme using multiple share images
- Secret image sharing based on chaotic map and Chinese remainder theorem
Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Cited In (8)
- A secret image sharing method using integer wavelet transform
- Three \((t, n )\)-secret image sharing schemes based on homogeneous linear recursion
- A compressed secret image sharing method with shadow image verification capability
- Recursive hiding of biometrics-based secret sharing scheme using adversary structure
- Sharing a verifiable secret image using two shadows
- Title not available (Why is that?)
- Fake and dishonest participant location scheme in secret image sharing
- A robust image encryption scheme using chaotic tent map and cellular automata
This page was built for publication: A verifiable secret image sharing scheme based on compressive sensing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5384341)