Login / Signup
Verifiable secret sharing based on the Chinese remainder theorem.
Lein Harn
Fuyou Miao
Chin-Chen Chang
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
secret sharing
chinese remainder theorem
secret image sharing
secret image
secret sharing scheme
multi party
reconstructed image
visual cryptography
spatial domain
cover image
human eyes
image reconstruction
computer vision
encryption scheme
video sequences
key management