Login / Signup

Recursive hiding of biometrics-based secret sharing scheme using adversary structure.

Hong LaiJinghua XiaoLixiang LiYixian Yang
Published in: Inf. Process. Lett. (2012)
Keyphrases
  • secret sharing scheme
  • secret sharing
  • key management
  • image processing
  • feature extraction
  • multiscale
  • image data