Cheating in visual cryptography
From MaRDI portal
Publication:2491269
DOI10.1007/s10623-005-6342-0zbMath1146.94012OpenAlexW2067306608MaRDI QIDQ2491269
Du-Shiau Tsai, Gwoboa Horng, Tzung-Her Chen
Publication date: 29 May 2006
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-005-6342-0
Related Items (8)
Hierarchical Visual Secret Sharing Scheme Using Steganography ⋮ Region splitting visual cryptography using random grids ⋮ A cheating prevention scheme for binary visual cryptography with homogeneous secret images ⋮ A study for security of visual cryptography ⋮ Towards cheat-preventing in block-based progressive visual cryptography for general access structures ⋮ Prevention of cheating in visual cryptography by using coherent patterns ⋮ Sharing a verifiable secret image using two shadows ⋮ MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
Cites Work
- How to share a secret with cheaters
- A perfect threshold secret sharing scheme to identify cheaters
- How to share a secret
- Efficient cheater identification method for threshold schemes
- Efficient dispersal of information for security, load balancing, and fault tolerance
- The Detection of Cheaters in Thershold Schemes
- An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
This page was built for publication: Cheating in visual cryptography