Recommendations
Cites work
- scientific article; zbMATH DE number 1088244 (Why is no real title available?)
- scientific article; zbMATH DE number 1088271 (Why is no real title available?)
- scientific article; zbMATH DE number 1088898 (Why is no real title available?)
- scientific article; zbMATH DE number 1500549 (Why is no real title available?)
- scientific article; zbMATH DE number 2102766 (Why is no real title available?)
- Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes
- Extended capabilities for visual cryptography
- New Results on Visual Cryptography
- On the contrast in visual cryptography schemes
- Visual cryptography for general access structures
Cited in
(26)- Probabilistic visual secret sharing schemes for grey-scale images and color images
- A general method for construction of \((t, n)\)-threshold visual secret sharing schemes for color images
- A cheating prevention scheme for binary visual cryptography with homogeneous secret images
- Visual cryptography from halftone error diffusion
- Efficient visual secret sharing scheme for color images
- A secure scheme to share secret color images
- Visual cryptographic schemes using combined Boolean operations
- Sharing a verifiable secret image using two shadows
- A new approach to image sharing with high-security threshold structure
- Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems
- MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
- Visual cryptography for natural images and visual voting
- Eine Einführung in die visuelle Kryptographie
- Information and Communications Security
- Extended visual cryptography schemes
- scientific article; zbMATH DE number 2058633 (Why is no real title available?)
- Perfect contrast XOR-based visual cryptography schemes via linear algebra
- On general construction for extended visual cryptography schemes
- Optimal (k, n) visual cryptographic schemes for general k
- Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
- Two secret sharing schemes based on Boolean operations
- New extended visual cryptography schemes with clearer shadow images
- An overview of the black and white visual cryptography using mathematics
- Optimal \((2, n )\) visual cryptographic schemes
- Visual cryptography for gray-level images by dithering techniques
- Visual secret sharing for multiple secrets
This page was built for publication: Visual cryptography for grey level images
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q294839)