The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1007/978-3-030-03748-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Preview-Versioned Essential Secret Image Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Compared to those, the visual cryptography scheme (VCS) [ 22 , 23 , 24 , 25 , 26 ] is suitable to encrypt QR codes.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to those, the visual cryptography scheme (VCS) [ 22 , 23 , 24 , 25 , 26 ] is suitable to encrypt QR codes.…”
Section: Introductionmentioning
confidence: 99%
“…The threshold of essential shareholders is equal to t$t$ and the general threshold is equal to k$k$. Scholarly works on ESIS${\mathrm{ESIS}}$ have been published by several authors [4–12]. Peng Li et al.…”
Section: Introductionmentioning
confidence: 99%
“…s shareholders are essential and n − s shareholders are non-essential. The threshold of essential shareholders is equal to t and the general threshold is equal to k. Scholarly works on ESIS have been published by several authors [4][5][6][7][8][9][10][11][12]. Peng Li et al [11] introduced a general (t , s, k, n) -ESISscheme in 2013.…”
mentioning
confidence: 99%
“…Several works on ESIS schemes have been done in Refs. [14,[19][20][21][22][23][24][25][26]. In 2013, Peng Li et al [25] first introduced a general essential secret image sharing (t, s, k, n) scheme.…”
mentioning
confidence: 99%