Login / Signup
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem.
Suraj Kumar Sahoo
Avishek Adhikari
Sabyasachi Dutta
Published in:
Comput. Electr. Eng. (2022)
Keyphrases
</>
chinese remainder theorem
secret image sharing
image data
wireless sensor networks
gray scale