Application of Threshold Secret Sharing to Image Authentication and Recovery

July 15, 2016 | Author: thesij | Category: Types, Presentations


Description

Shu-Fen Tu, Ching-Sheng Hsu & Fu-HsingWang...

Comments

SUPPORT DOCURI