Digital image processing (2nd ed.)
Digital image processing (2nd ed.)
Journal of Combinatorial Theory Series A
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Secret sharing and visual cryptography schemes
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels
Designs, Codes and Cryptography
Improved Schemes for Visual Cryptography
Designs, Codes and Cryptography
A New Approach for Visual Cryptography
Designs, Codes and Cryptography
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
Randomness in secret sharing and visual cryptography schemes
Theoretical Computer Science
A neural-network approach for visual cryptography and authorization
Design and application of hybrid intelligent systems
Secret image sharing with steganography and authentication
Journal of Systems and Software
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Pattern Recognition Letters
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Image encryption by random grids
Pattern Recognition
Efficient visual secret sharing scheme for color images
Pattern Recognition
Colored visual cryptography without color darkening
Theoretical Computer Science
The semipublic encryption for visual cryptography using Q'tron neural networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Two secret sharing schemes based on Boolean operations
Pattern Recognition
Sharing multiple secrets in visual cryptography
Pattern Recognition
Colored visual cryptography scheme based on additive color mixing
Pattern Recognition
Visual secret sharing for multiple secrets
Pattern Recognition
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
Information Security and Cryptology
Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
An extended secret sharing scheme for colour images with fixed pixel expansion
International Journal of Electronic Security and Digital Forensics
Image encryption by multiple random grids
Pattern Recognition
On general construction for extended visual cryptography schemes
Pattern Recognition
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
Bounds for visual cryptography schemes
Discrete Applied Mathematics
A new definition of the contrast of visual cryptography scheme
Information Processing Letters
A novel visual secret sharing scheme for multiple secrets without pixel expansion
Expert Systems with Applications: An International Journal
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
On converting secret sharing scheme to visual secret sharing scheme
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences: an International Journal
A formal approach towards measuring trust in distributed systems
Proceedings of the 2011 ACM Symposium on Applied Computing
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
Using colors to improve visual cryptography for black and white images
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
A general method for construction of (t, n)-threshold visual secret sharing schemes for color images
Designs, Codes and Cryptography
Visual Multiple-Secret Sharing by Circle Random Grids
SIAM Journal on Imaging Sciences
ICIAR'06 Proceedings of the Third international conference on Image Analysis and Recognition - Volume Part I
New size-reduced visual secret sharing schemes with half reduction of shadow size
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Colored visual cryptography without color darkening
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Random grid-based visual secret sharing for general access structures with cheat-preventing ability
Journal of Systems and Software
Perfect reconstruction of black pixels revisited
FCT'05 Proceedings of the 15th international conference on Fundamentals of Computation Theory
Compatible ideal contrast visual cryptography schemes with reversing
ISC'05 Proceedings of the 8th international conference on Information Security
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Scaling privacy guarantees in code-verification elections
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Region-in-Region incrementing visual cryptography scheme
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Color visual cryptography schemes for black and white secret images
Theoretical Computer Science
Improved tagged visual cryptography by random grids
Signal Processing
On (k, n)*-visual cryptography scheme
Designs, Codes and Cryptography
Hi-index | 0.01 |
The idea of visual k out of nsecret sharing schemes was introduced in Naor. Explicit constructionsfor k = 2 and k = n can be found there.For general k out of n schemes boundshave been described.Here, two general kout of n constructions are presented. Their parametersare related to those of maximum size arcs or MDS codes. Further,results on the structure of k out of nschemes, such as bounds on their parameters, are obtained. Finally,the notion of coloured visual secret sharing schemes is introducedand a general construction is given.