Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Extended capabilities for visual cryptography
Theoretical Computer Science
Digital Color Halftoning
Modern Digital Halftoning
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
ACM SIGGRAPH 2004 Papers
Efficient visual secret sharing scheme for color images
Pattern Recognition
Sharing multiple secrets in visual cryptography
Pattern Recognition
Visual Secret Sharing Schemes for Color Images Using Halftoning
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 03
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Sharing visual multi-secrets using circle shares
Computer Standards & Interfaces
New size-reduced visual secret sharing schemes with half reduction of shadow size
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactly together, the original secret can be recovered without computer participation. In this paper, we take multiple secrets into consideration and generate a key share for all the secrets; correspondingly, we share each secret using this key share. The secrets are recovered when the key is superimposed on the combined share in different locations using the proposed scheme. Also discussed and illustrated within this paper is how to embed a share of visual cryptography into halftone and colour images. The remaining share is used as a key share in order to perform the decryption. It is also worth noting that no information regarding the secrets is leaked in any of our proposed schemes. We provide the corresponding results in this paper.