An explication of secret sharing schemes
Designs, Codes and Cryptography
Visual cryptography for general access structures
Information and Computation
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Extended capabilities for visual cryptography
Theoretical Computer Science
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Contrast-optimal k out of n secret sharing schemes in visual cryptography
Theoretical Computer Science - computing and combinatorics
Improved Schemes for Visual Cryptography
Designs, Codes and Cryptography
Linear threshold schemes, visual cryptography, and parasite-host cryptosystems
Linear threshold schemes, visual cryptography, and parasite-host cryptosystems
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
A new multi-secret images sharing scheme using Largrange's interpolation
Journal of Systems and Software
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Probabilistic Visual Cryptography Schemes
The Computer Journal
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images
Information Security and Cryptology
Sharing a verifiable secret image using two shadows
Pattern Recognition
A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Self-verifying visual secret sharing using error diffusion and interpolation techniques
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Efficient multi-secret image sharing based on Boolean operations
Signal Processing
A novel visual secret sharing scheme for multiple secrets without pixel expansion
Expert Systems with Applications: An International Journal
Invertible secret image sharing with steganography
Pattern Recognition Letters
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
On converting secret sharing scheme to visual secret sharing scheme
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences: an International Journal
A hierarchical threshold secret image sharing
Pattern Recognition Letters
Medical image protection using secret sharing scheme
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
Random grid-based visual secret sharing with abilities of OR and XOR decryptions
Journal of Visual Communication and Image Representation
An extended multi-secret images sharing scheme based on boolean operation
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
A secret sharing scheme for EBTC using steganography
Journal of Intelligent Manufacturing
Hi-index | 0.01 |
Traditional secret sharing schemes involve complex computation. A visual secret sharing (VSS) scheme decodes the secret without computation, but each shadow is m times as big as the original. Probabilistic VSS solved the computation complexity and space complexity problems at once. In this paper we propose a probabilistic (2,n) scheme for binary images and a deterministic (n,n) scheme for grayscale images. Both use simple Boolean operations and both have no pixel expansion. The (2,n) scheme provides a better contrast and significantly smaller recognized areas than other methods. The (n,n) scheme gives an exact reconstruction.