Multiparty verification in image secret sharing
From MaRDI portal
Publication:6081288
DOI10.1016/j.ins.2021.03.029zbMath1525.94060OpenAlexW3139122291MaRDI QIDQ6081288
Xuehu Yan, Zulie Pan, Guozheng Yang, Xiao Feng Zhong, Junhao Li
Publication date: 25 October 2023
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2021.03.029
Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- A discussion on the relationship between probabilistic visual cryptography and random grid
- Sharing secrets in stego images with authentication
- Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Threshold changeable secret sharing with secure secret reconstruction
- Perfect contrast XOR-based visual cryptography schemes via linear algebra
- Secret sharing with secure secret reconstruction
- How to share a secret
This page was built for publication: Multiparty verification in image secret sharing