Login / Signup
Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Hong Lai
Jinghua Xiao
Lixiang Li
Yixian Yang
Published in:
Inf. Process. Lett. (2012)
Keyphrases
</>
secret sharing scheme
secret sharing
key management
image processing
feature extraction
multiscale
image data