A construction method of (t, k, n)-essential secret image sharing scheme P Li, Z Liu, CN Yang Signal Processing: Image Communication 65, 210-220, 2018 | 60 | 2018 |
An improved essential secret image sharing scheme with smaller shadow size P Li, Z Liu International Journal of Digital Crime and Forensics (IJDCF) 10 (3), 78-94, 2018 | 16 | 2018 |
Weighted visual secret sharing for general access structures based on random grids Z Liu, G Zhu, F Ding, S Kwong Signal Processing: Image Communication 92, 116129, 2021 | 14 | 2021 |
A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition Z Liu, G Zhu, YG Wang, J Yang, S Kwong ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020 | 14 | 2020 |
Contrast-enhanced color visual cryptography for (k, n) threshold schemes Z Liu, G Zhu, F Ding, X Luo, S Kwong, P Li ACM Transactions on Multimedia Computing, Communications and Applications 18 …, 2022 | 9 | 2022 |
A novel visual cryptography scheme with different importance of shadows P Li, Z Liu Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017 …, 2017 | 5 | 2017 |
Chinese remainder theorem-based essential secret image sharing Z Liu, J Yang, G Zhu 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021 | 3 | 2021 |
An efficient cheating-detectable secret image sharing scheme with smaller share sizes Z Liu, G Zhu, Y Zhang, H Zhang, S Kwong Journal of Information Security and Applications 81, 103709, 2024 | 1 | 2024 |