Extended visual cryptography schemes
From MaRDI portal
Publication:879599
Abstract: Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into shadow images and to give exactly one such shadow image to each member of a group of persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of or the question of contrast optimizing, in this paper we study extended visual cryptography schemes, i.e. shared secret systems where any subset of shares its own secret.
Recommendations
Cites work
Cited in
(9)- scientific article; zbMATH DE number 6741952 (Why is no real title available?)
- Visual cryptography on graphs
- Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes
- Extended capabilities for visual cryptography
- scientific article; zbMATH DE number 1588476 (Why is no real title available?)
- New extended visual cryptography schemes with clearer shadow images
- Visual cryptography
- On general construction for extended visual cryptography schemes
- Flexible Visual Cryptography Scheme and Its Application
This page was built for publication: Extended visual cryptography schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q879599)