Login / Signup
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
Li Liu
Anhong Wang
Chin-Chen Chang
Zhihong Li
Published in:
Int. J. Netw. Secur. (2017)
Keyphrases
</>
secret image sharing
chinese remainder theorem
cover image
singular value decomposition
secret image
singular values
information hiding
spread spectrum
secret information