Author of the publication

A (n, n)-threshold Secret Sharing Scheme for Barcode Application.

, , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1023-1028. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedding information on search-order codes of VQ indices by rearranging the indicators., , , , and . ICCE-TW, page 504-505. IEEE, (2015)Verifiable and Lossless Distributed Media Content Sharing.. UIC, volume 6905 of Lecture Notes in Computer Science, page 79-93. Springer, (2011)Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation., and . UIC/ATC, page 1002-1005. IEEE Computer Society, (2012)Significance-Preserving Codebook Using Generic Algorithm., and . FSKD (3), page 660-664. IEEE Computer Society, (2007)0-7695-2874-0.Analyze the Digital Watermarking Security Demands for the Facebook Website., and . ICGEC, page 31-34. IEEE, (2012)Sharing a Secret Two-Tone Image in Two Gray-Level Images., , and . ICPADS (2), page 300-304. IEEE Computer Society, (2005)Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code.. IEEE Trans. Ind. Informatics, 12 (1): 384-392 (2016)Prevention of cheating in visual cryptography by using coherent patterns., , , and . Inf. Sci., (2015)A Confidential QR Code Approach with Higher Information Privacy., , , and . Entropy, 24 (2): 284 (2022)A Smart Roadside Parking System Using Bluetooth Low Energy Beacons., , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 471-480. Springer, (2019)