Visual cryptography schemes have been introduced in 1994 by Naor and Shamir [9]. These kind of schemes have been also well described by C. Blundo, A. De Santis and D.R. Stinson in [3]. In this case, a secret image may be encoded into shadow images called the shares, and to give exactly one such shadow image to each member of a group of persons. Certain qualified subsets of participants can visually recover , but other, forbidden sets of participants have no information on . A visual recovery for a set consists of photocopying the shares given to the participants and then stacking them. Shortly afterwards the discovery of visual cryptography schemes Droste gave a generalization of such schemes, and Ateniese et al, formalized the idea of Naor and Shamir of an extension of the model which conceals the very existence of the secret image. Ateniese et al have called this formalization, Extended Visual Cryptography [5,7,10]. In order to encode and hide a given set 1 , 2 , . . . , of gray-level images, in this paper, we propose an Extended Visual Cryptography Scheme for which the decoding process simulates a cocktail party effect.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.