These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
146 related articles for article (PubMed ID: 31499691)
1. Reducing file size and time complexity in secret sharing based document protection. Liu YX; Zhang YZ; Yang CN Math Biosci Eng; 2019 May; 16(5):4802-4817. PubMed ID: 31499691 [TBL] [Abstract][Full Text] [Related]
3. A novel secret sharing scheme using multiple share images. Li XP; Liu YJ; Chen HF; Chang CC Math Biosci Eng; 2019 Jul; 16(6):6350-6366. PubMed ID: 31698566 [TBL] [Abstract][Full Text] [Related]
4. Two-level QR code scheme based on region matrix image secret sharing algorithm. Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029 [TBL] [Abstract][Full Text] [Related]
5. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. Fujiwara M; Waseda A; Nojima R; Moriai S; Ogata W; Sasaki M Sci Rep; 2016 Jul; 6():28988. PubMed ID: 27363566 [TBL] [Abstract][Full Text] [Related]
6. Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19. Sarkar A; Sarkar M Multimed Tools Appl; 2021; 80(14):21899-21923. PubMed ID: 33776546 [TBL] [Abstract][Full Text] [Related]
7. Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing. Yu H; Zhang J; Xiang Z; Liu B; Feng H Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430779 [TBL] [Abstract][Full Text] [Related]
8. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Weng CY; Yang CH Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832576 [TBL] [Abstract][Full Text] [Related]
9. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Pan JS; Liu T; Yan B; Yang HM; Chu SC Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190441 [TBL] [Abstract][Full Text] [Related]
10. Fake and dishonest participant location scheme in secret image sharing. Liu J; Sun L; Liu J; Yan X Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556 [TBL] [Abstract][Full Text] [Related]
11. Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem. Wang C; Peng Y; Liang Z; Wang Y; Ke G; Jin Z Heliyon; 2023 Apr; 9(4):e14918. PubMed ID: 37095991 [TBL] [Abstract][Full Text] [Related]
12. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing. Bao L; Yi S; Zhou Y IEEE Trans Image Process; 2017 Dec; 26(12):5618-5631. PubMed ID: 28809684 [TBL] [Abstract][Full Text] [Related]
13. Weighted visual secret sharing with multiple decryptions and lossless recovery. Liu F; Yan XH; Lu YL; Tan LD Math Biosci Eng; 2019 Jun; 16(5):5750-5764. PubMed ID: 31499736 [TBL] [Abstract][Full Text] [Related]
14. A Novel General ( Xing F; Yan X; Yu L; Li L Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829 [TBL] [Abstract][Full Text] [Related]
15. A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Jia XX; Song YX; Wang DS; Nie DX; Wu JZ Math Biosci Eng; 2019 Feb; 16(3):1280-1299. PubMed ID: 30947420 [TBL] [Abstract][Full Text] [Related]
16. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability. Lee CW; Tsai WH IEEE Trans Image Process; 2012 Jan; 21(1):207-18. PubMed ID: 21693424 [TBL] [Abstract][Full Text] [Related]
17. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944 [TBL] [Abstract][Full Text] [Related]