Extended visual cryptography schemes
From MaRDI portal
Publication:879599
Abstract: Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into shadow images and to give exactly one such shadow image to each member of a group of persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of or the question of contrast optimizing, in this paper we study extended visual cryptography schemes, i.e. shared secret systems where any subset of shares its own secret.
Recommendations
Cites work
Cited in
(9)- Visual cryptography
- scientific article; zbMATH DE number 1588476 (Why is no real title available?)
- Flexible Visual Cryptography Scheme and Its Application
- scientific article; zbMATH DE number 6741952 (Why is no real title available?)
- Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes
- Extended capabilities for visual cryptography
- Visual cryptography on graphs
- On general construction for extended visual cryptography schemes
- New extended visual cryptography schemes with clearer shadow images
This page was built for publication: Extended visual cryptography schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q879599)