Login / Signup

Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem.

Suraj Kumar SahooAvishek AdhikariSabyasachi Dutta
Published in: Comput. Electr. Eng. (2022)
Keyphrases
  • chinese remainder theorem
  • secret image sharing
  • image data
  • wireless sensor networks
  • gray scale