2017
DOI: 10.1007/978-3-319-71598-8_47
|View full text |Cite
|
Sign up to set email alerts
|

Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…In 2002, Thien and Lin [7] used Shamir's secret sharing scheme [1] to share a secret image. There are many types of (k, n) − SIS schemes, such as progressive SIS [6], multiple SIS [9], meaningful SIS [10,11], partial SIS [12], scalable SIS [13,14], adversary structure scheme [5], public access structure [11,15,16], fraud detection [17,18], SIS based on encrypted pixels [8] etc.…”
mentioning
confidence: 99%
“…In 2002, Thien and Lin [7] used Shamir's secret sharing scheme [1] to share a secret image. There are many types of (k, n) − SIS schemes, such as progressive SIS [6], multiple SIS [9], meaningful SIS [10,11], partial SIS [12], scalable SIS [13,14], adversary structure scheme [5], public access structure [11,15,16], fraud detection [17,18], SIS based on encrypted pixels [8] etc.…”
mentioning
confidence: 99%