Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - JOURNAL OF SYSTEMS AND SOFTWARE, 2004 - ir.lib.nycu.edu.tw
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and Software, 2004 - scholar.nycu.edu.tw
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - 2004 - asiair.asia.edu.tw
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - The Journal of Systems & Software, 2004 - infona.pl
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

[引用][C] Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and Software, 2004 - cir.nii.ac.jp
Secret image sharing with steganography and authentication | CiNii Research CiNii 国立情報学
研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データをさがす 大学 …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and Software, 2004 - dl.acm.org
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …