Extended capabilities for visual cryptography

From MaRDI portal
Publication:1589430

DOI10.1016/S0304-3975(99)00127-9zbMath0952.68056OpenAlexW1988245022WikidataQ126461029 ScholiaQ126461029MaRDI QIDQ1589430

Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson

Publication date: 12 December 2000

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/s0304-3975(99)00127-9




Related Items (27)

Three \((t, n )\)-secret image sharing schemes based on homogeneous linear recursionEfficient visual secret sharing scheme for color imagesVisual cryptography for grey level imagesTwo secret sharing schemes based on Boolean operationsImage encryption by random gridsExtended visual cryptography schemesMeasure-Independent Characterization of Contrast Optimal Visual Cryptography SchemesRevisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic SchemesExtended color visual cryptography for black and white secret imageVisual cryptography on graphsTowards cheat-preventing in block-based progressive visual cryptography for general access structuresMeaningful share generation for increased number of secrets in visual secret-sharing schemeA new online extended visual cryptography scheme for STS access structuresColoured visual cryptography using fixed size meaningful shareVisual cryptograms of random grids for threshold access structuresOptimal colored threshold visual cryptography schemesOn general construction for extended visual cryptography schemesNew extended visual cryptography schemes with clearer shadow imagesThe alignment problem of visual cryptography schemesOn the security of a visual cryptography scheme for color imagesExploiting the Error Correction Mechanism in QR Codes for Secret SharingA new visual cryptography scheme for STS based access structuresColored visual cryptography without color darkeningMTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficultyA New Approach to Image Sharing with High-Security Threshold StructureCooperative secret sharing using QR codes and symmetric keysThe accessibility of an access structure



Cites Work




This page was built for publication: Extended capabilities for visual cryptography