A new approach to image sharing with high-security threshold structure
DOI10.1145/2666470zbMATH Open1321.94114OpenAlexW1978927729MaRDI QIDQ5501945FDOQ5501945
Authors: Qizhao Yuan, Hongliang Cai, Jiajia Fang, Xiaojing Wang
Publication date: 14 August 2015
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2666470
Recommendations
information hidingimage sharingdata protectionalgebraic-geometry codingtwice vision sharing procedure
Cryptography (94A60) Computing methodologies for image processing (68U10) Authentication, digital signatures and secret sharing (94A62) Geometric methods (including applications of algebraic geometry) applied to coding theory (94B27)
Cites Work
- How to share a secret
- Title not available (Why is that?)
- Error control coding. Fundamentals and applications
- On the information rate of perfect secret sharing schemes
- Extended capabilities for visual cryptography
- Visual cryptography for general access structures
- Visual cryptography for grey level images
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved schemes for visual cryptography
- Efficient visual secret sharing scheme for color images
- Two secret sharing schemes based on Boolean operations
- A secure scheme to share secret color images
- An asymmetric watermarking method
- Title not available (Why is that?)
- Algebraic-geometry codes
Cited In (3)
This page was built for publication: A new approach to image sharing with high-security threshold structure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5501945)