Login / Signup
Collusive Attacks to Partition Authentication Visual Cryptography Scheme.
YaWei Ren
Feng Liu
Wen Wang
Published in:
IWDW (2016)
Keyphrases
</>
visual cryptography scheme
security mechanisms
secret sharing
digital watermarking
secret sharing scheme
visual cryptography
watermarking scheme
resource constrained
image authentication
watermarking algorithm
authentication scheme
video sequences
black and white
authentication protocol