共 23 条
[2]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]
Efficient cheater identification method for threshold schemes
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
1997, 144 (01)
:23-27
[4]
Sharing secrets in stego images with authentication
[J].
PATTERN RECOGNITION,
2008, 41 (10)
:3130-3137
[5]
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes
[J].
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II,
2009,
:303-+
[6]
Chang Chin-Chen., 2008, 2008 3rd international conference on innovative computing information and control, P17
[7]
Fault-tolerant and progressive transmission of images
[J].
PATTERN RECOGNITION,
2005, 38 (12)
:2466-2471
[9]
Felgenhauer F., 2006, Mathematical Spectrum, V39, P15