Author of the publication

Secret image sharing with separate shadow authentication ability.

, , , , , and . Signal Process. Image Commun., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Support Vector Machine Based Prediction on Sensitivity to Coal Ash Blast for Different Degrees of Deterioration., , , and . J. Sensors, (2022)Robust Secret Image Sharing Scheme Against Noise in Shadow Images., , , , and . IEEE Access, (2021)A General Steganalysis Method of QR Codes., , , , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 472-483. Springer, (2022)Numerical simulation of agricultural unmanned helicopter corn canopy spraying., , , , , and . Comput. Electron. Agric., (2024)Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes., , , , and . J. Vis. Commun. Image Represent., (2022)On the Value of Order Number and Power in Secret Image Sharing., , , and . Secur. Commun. Networks, (2020)Design and experiment of a binocular vision-based canopy volume extraction system for precision pesticide application by UAVs., , , , , and . Comput. Electron. Agric., (October 2023)Secret image sharing with separate shadow authentication ability., , , , , and . Signal Process. Image Commun., (2020)The K-Core Decomposition Algorithm Under the Framework of GraphBLAS., , , , , and . HPEC, page 1-7. IEEE, (2021)Implementation of weighted summation type fractional Fourier transform on FPGA., , , and . ICDIP, volume 9631 of SPIE Proceedings, page 963125. SPIE, (2015)