Author of the publication

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.

, , , , and . Digit. Signal Process., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Common General Access Structure Construction Approach in Secret Image Sharing., , and . Int. J. Digit. Crime Forensics, 12 (3): 96-110 (2020)Robust Secret Image Sharing Scheme Against Noise in Shadow Images., , , , and . IEEE Access, (2021)Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes., , , and . MSN, page 374-379. IEEE Computer Society, (2016)A Novel Progressive Secret Image Sharing Method with Better Robustness., , , and . ICPCSEE (2), volume 728 of Communications in Computer and Information Science, page 539-550. Springer, (2017)General Meaningful Shadow Construction in Secret Image Sharing., , and . IEEE Access, (2018)BEDetector: A Two-Channel Encoding Method to Detect Vulnerabilities Based on Binary Similarity., , , , and . IEEE Access, (2021)Secret image sharing with separate shadow authentication ability., , , , , and . Signal Process. Image Commun., (2020)Participants increasing for threshold random grids-based visual secret sharing., and . J. Real-Time Image Processing, 14 (1): 13-24 (2018)Chinese remainder theorem-based two-in-one image secret sharing with three decoding options., , , , and . Digit. Signal Process., (2018)基于符号执行技术的网络程序漏洞检测系统 (Symbolic Execution Technology Based Defect Detection System for Network Programs)., , , and . 计算机科学, 45 (11A): 325-329 (2018)