Extended capabilities for visual cryptography

G Ateniese, C Blundo, A De Santis… - Theoretical Computer …, 2001 - Elsevier
An extended visual cryptography scheme (EVCS), for an access structure (Γ Qual, Γ Forb)
on a set of n participants, is a technique to encode n images in such a way that when we …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …

Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

New visual secret sharing schemes using probabilistic method

CN Yang - Pattern Recognition Letters, 2004 - Elsevier
Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image
by breaking it into shadow images (called shadows). Unlike other threshold schemes, VSS …

Two secret sharing schemes based on Boolean operations

D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …

Image encryption by random grids

SJ Shyu - Pattern recognition, 2007 - Elsevier
A random grid in this paper is a transparency comprising a two-dimensional array of pixels
that are either transparent or opaque determined in a totally random way. We design …

Visual cryptography for gray-level images by dithering techniques

CC Lin, WH Tsai - Pattern Recognition Letters, 2003 - Elsevier
A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n
shadow images, where any k or more of them can visually recover the secret image, but any …

On the contrast in visual cryptography schemes

C Blundo, A De Santis, DR Stinson - Journal of Cryptology, 1999 - Springer
A visual cryptography scheme is a method to encode a secret image SI into shadow images
called shares such that certain qualified subsets of shares enable the``visual''recovery of the …

Sharing multiple secrets in visual cryptography

SJ Shyu, SY Huang, YK Lee, RZ Wang, K Chen - Pattern recognition, 2007 - Elsevier
The secret sharing schemes in conventional visual cryptography are characterized by
encoding one shared secret into a set of random transparencies which reveal the secret to …

Visual cryptography for grey level images

C Blundo, A De Santis, M Naor - Information Processing Letters, 2000 - Elsevier
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture
Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of …