Cited By
View all- Bhat KJinwala DPrasad YZaveri M(2023)Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious ModelProceedings of the 2023 5th International Conference on Image Processing and Machine Vision10.1145/3582177.3582192(86-92)Online publication date: 13-Jan-2023
- Yan XLi LSun LChen JWang S(2022)Fake and Dishonest Participant Immune Secret Image SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357284219:4(1-26)Online publication date: 24-Nov-2022
- Gunasekaran EMuthuraman V(2022)Double layer secure secret images sharing scheme for biometricsDistributed and Parallel Databases10.1007/s10619-021-07362-x40:4(861-885)Online publication date: 1-Dec-2022
- Show More Cited By