Login / Signup

Secret image sharing scheme with adaptive authentication strength.

Güzin UlutasMustafa UlutasVasif V. Nabiyev
Published in: Pattern Recognit. Lett. (2013)
Keyphrases
  • secret image sharing
  • chinese remainder theorem
  • secret image
  • visual cryptography
  • image sequences