Sign Up to like & get
recommendations!
2
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14071445
Abstract: As Internet technology continues to profoundly impact our lives, techniques for information protection have become increasingly advanced and become a common discussion topic. With the aim to protect private images, this paper splits a secret…
read more here.
Keywords:
secret image;
using sudoku;
verifiable image;
sudoku matrix ... See more keywords