Visual cryptography for general access structures
Information and Computation
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Extended capabilities for visual cryptography
Theoretical Computer Science
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography
COCOON '97 Proceedings of the Third Annual International Conference on Computing and Combinatorics
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Image encryption by random grids
Pattern Recognition
Efficient visual secret sharing scheme for color images
Pattern Recognition
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
Information Security and Cryptology
Image encryption by multiple random grids
Pattern Recognition
Visual secret sharing by random grids revisited
Pattern Recognition
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Threshold visual secret sharing by random grids
Journal of Systems and Software
Cheating Prevention in Visual Cryptography
IEEE Transactions on Image Processing
Threshold visual secret sharing by random grids with improved contrast
Journal of Systems and Software
Improved tagged visual cryptography by random grids
Signal Processing
Hi-index | 0.00 |
Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented.