These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
22. Threshold secret sharing scheme based on phase-shifting interferometry. Deng X; Shi Z; Wen W Appl Opt; 2016 Nov; 55(31):8855-8859. PubMed ID: 27828285 [TBL] [Abstract][Full Text] [Related]
23. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Weng CY; Yang CH Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832576 [TBL] [Abstract][Full Text] [Related]
24. Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information. Chou YH; Zeng GJ; Chen XY; Kuo SY Sci Rep; 2021 Mar; 11(1):6093. PubMed ID: 33731781 [TBL] [Abstract][Full Text] [Related]
25. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes. Xie D; Li L; Peng H; Yang Y PLoS One; 2017; 12(1):e0168674. PubMed ID: 28072851 [TBL] [Abstract][Full Text] [Related]
26. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow. Pang L; Miao D; Li H; Wang Q ScientificWorldJournal; 2015; 2015():861546. PubMed ID: 26351657 [TBL] [Abstract][Full Text] [Related]
27. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding. Lai H; Zhang J; Luo MX; Pan L; Pieprzyk J; Xiao F; Orgun MA Sci Rep; 2016 Aug; 6():31350. PubMed ID: 27515908 [TBL] [Abstract][Full Text] [Related]
28. Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Velumani R; Sudalaimuthu H; Choudhary G; Bama S; Jose MV; Dragoni N Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458944 [TBL] [Abstract][Full Text] [Related]
29. Secret Sharing of a Quantum State. Lu H; Zhang Z; Chen LK; Li ZD; Liu C; Li L; Liu NL; Ma X; Chen YA; Pan JW Phys Rev Lett; 2016 Jul; 117(3):030501. PubMed ID: 27472103 [TBL] [Abstract][Full Text] [Related]
30. Reducing file size and time complexity in secret sharing based document protection. Liu YX; Zhang YZ; Yang CN Math Biosci Eng; 2019 May; 16(5):4802-4817. PubMed ID: 31499691 [TBL] [Abstract][Full Text] [Related]
31. Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction. Prasetyo H; Hsia CH; Wicaksono Hari Prayuda A J Imaging; 2021 Apr; 7(4):. PubMed ID: 34460520 [TBL] [Abstract][Full Text] [Related]
32. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation. Yuan L; Li M; Guo C; Choo KR; Ren Y PLoS One; 2016; 11(10):e0165512. PubMed ID: 27792784 [TBL] [Abstract][Full Text] [Related]
33. Secret sharing scheme based on spread spectrum ghost imaging. Liu J; Wang L; Zhao S Appl Opt; 2022 Aug; 61(24):7102-7107. PubMed ID: 36256327 [TBL] [Abstract][Full Text] [Related]
34. Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19. Sarkar A; Sarkar M Multimed Tools Appl; 2021; 80(14):21899-21923. PubMed ID: 33776546 [TBL] [Abstract][Full Text] [Related]
35. Lossless Image Steganography Based on Invertible Neural Networks. Liu L; Tang L; Zheng W Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167 [TBL] [Abstract][Full Text] [Related]
36. GAN-Based Key Secret-Sharing Scheme in Blockchain. Zheng W; Wang K; Wang FY IEEE Trans Cybern; 2021 Jan; 51(1):393-404. PubMed ID: 31985449 [TBL] [Abstract][Full Text] [Related]
37. Meaningful secret image sharing for JPEG images with arbitrary quality factors. Jiang Y; Yan X; Chen J; Cheng J; Zhang J Math Biosci Eng; 2022 Aug; 19(11):11544-11562. PubMed ID: 36124603 [TBL] [Abstract][Full Text] [Related]
38. Multi-Party Quantum Secret Sharing Based on GHZ State. Li Z; Jiang X; Liu L Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420454 [TBL] [Abstract][Full Text] [Related]
39. (t, n) Threshold d-Level Quantum Secret Sharing. Song XL; Liu YB; Deng HY; Xiao YG Sci Rep; 2017 Jul; 7(1):6366. PubMed ID: 28743880 [TBL] [Abstract][Full Text] [Related]
40. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]