Peng Li

Orcid: 0000-0003-1008-8934

Affiliations:
  • North China Electric Power University, Department of Mathematics and Physics, Baoding, China
  • Harbin Institute of Technology, China (PhD 2012)


According to our database1, Peng Li authored at least 19 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain.
IEEE Internet Things J., March, 2024

2023
(<i>k, n</i>) secret image sharing scheme with privileged set.
J. Inf. Secur. Appl., March, 2023

2022
Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes.
ACM Trans. Multim. Comput. Commun. Appl., 2022

XOR-based visual cryptography scheme with essential shadows.
J. Vis. Commun. Image Represent., 2022

2020
(<i>t</i>, <i>k</i>, <i>n</i>) XOR-based visual cryptography scheme with essential shadows.
J. Vis. Commun. Image Represent., 2020

Cheating immune <i>k</i>-out-of-<i>n</i> block-based progressive visual cryptography.
J. Inf. Secur. Appl., 2020

A Construction Method of (2, 3) Visual Cryptography Scheme.
IEEE Access, 2020

2019
Cheating Detection in (k, n) Secret Image Sharing Scheme.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
A construction method of (t, k, n)-essential secret image sharing scheme.
Signal Process. Image Commun., 2018

Two Zero-Watermark methods for XML documents.
J. Real Time Image Process., 2018

A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.
J. Real Time Image Process., 2018

An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size.
Int. J. Digit. Crime Forensics, 2018

2017
A Novel Visual Cryptography Scheme with Different Importance of Shadows.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
Essential secret image sharing scheme with the same size of shadows.
Digit. Signal Process., 2016

2015
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach.
Signal Process. Image Commun., 2015

2014
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Essential secret image sharing scheme with different importance of shadows.
J. Vis. Commun. Image Represent., 2013

Sharing more information in gray visual cryptography scheme.
J. Vis. Commun. Image Represent., 2013

2012
Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
J. Vis. Commun. Image Represent., 2012


  Loading...