Progress in Cryptology - INDOCRYPT 2003
From MaRDI portal
Publication:5429124
DOI10.1007/b94593zbMath1123.94373OpenAlexW753701005MaRDI QIDQ5429124
Avishek Adhikari, Somnath Sikdar
Publication date: 29 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b94593
Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Related Items (9)
Constructions and analysis of some efficient \(t\)-\((k,n)^\ast\)-visual cryptographic schemes using linear algebraic techniques ⋮ Two secret sharing schemes based on Boolean operations ⋮ Color visual cryptography schemes for black and white secret images ⋮ Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes ⋮ Maximal contrast color visual secret sharing schemes ⋮ Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images ⋮ Sharing a verifiable secret image using two shadows ⋮ A general method for construction of \((t, n)\)-threshold visual secret sharing schemes for color images ⋮ Colored visual cryptography without color darkening
This page was built for publication: Progress in Cryptology - INDOCRYPT 2003