These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
142 related articles for article (PubMed ID: 35940552)
1. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Sun Y; Yang CN; Yan X; Lu Y; Sun L Gene Expr Patterns; 2022 Sep; 45():119267. PubMed ID: 35940552 [TBL] [Abstract][Full Text] [Related]
2. AMBTC-based visual secret sharing with different meaningful shadows. Wang S; Lu Y; Yan X; Li L; Yu Y Math Biosci Eng; 2021 Jun; 18(5):5236-5251. PubMed ID: 34517486 [TBL] [Abstract][Full Text] [Related]
3. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity. Hong W; Li D; Lou DC; Zhou X; Chang CH PLoS One; 2020; 15(4):e0230997. PubMed ID: 32298280 [TBL] [Abstract][Full Text] [Related]
4. A Novel General ( Xing F; Yan X; Yu L; Li L Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327829 [TBL] [Abstract][Full Text] [Related]
5. A recoverable AMBTC authentication scheme using similarity embedding strategy. Hong W; Zhou X; Lou DC PLoS One; 2019; 14(2):e0212802. PubMed ID: 30811472 [TBL] [Abstract][Full Text] [Related]
6. Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy. Lin YH; Hsia CH; Chen BY; Chen YY Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035557 [TBL] [Abstract][Full Text] [Related]
7. Fake and dishonest participant location scheme in secret image sharing. Liu J; Sun L; Liu J; Yan X Math Biosci Eng; 2021 Mar; 18(3):2473-2495. PubMed ID: 33892556 [TBL] [Abstract][Full Text] [Related]
8. Image inpainting-based behavior image secret sharing. Yan XH; Zhou X; Lu YL; Liu JJ; Yang GZ Math Biosci Eng; 2020 Mar; 17(4):2950-2966. PubMed ID: 32987509 [TBL] [Abstract][Full Text] [Related]
9. Meaningful secret image sharing for JPEG images with arbitrary quality factors. Jiang Y; Yan X; Chen J; Cheng J; Zhang J Math Biosci Eng; 2022 Aug; 19(11):11544-11562. PubMed ID: 36124603 [TBL] [Abstract][Full Text] [Related]
10. Meaningful Secret Image Sharing with Saliency Detection. Cheng J; Yan X; Liu L; Jiang Y; Wang X Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327851 [TBL] [Abstract][Full Text] [Related]
11. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes. Xie D; Li L; Peng H; Yang Y PLoS One; 2017; 12(1):e0168674. PubMed ID: 28072851 [TBL] [Abstract][Full Text] [Related]
15. Threshold secret sharing scheme based on phase-shifting interferometry. Deng X; Shi Z; Wen W Appl Opt; 2016 Nov; 55(31):8855-8859. PubMed ID: 27828285 [TBL] [Abstract][Full Text] [Related]
16. Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem. Wang C; Peng Y; Liang Z; Wang Y; Ke G; Jin Z Heliyon; 2023 Apr; 9(4):e14918. PubMed ID: 37095991 [TBL] [Abstract][Full Text] [Related]
17. AMBTC based high payload data hiding with modulo-2 operation and Hamming code. Li L; Zhang SQ; Luo T; Chang CC Math Biosci Eng; 2019 Aug; 16(6):7934-7949. PubMed ID: 31698648 [TBL] [Abstract][Full Text] [Related]