2016
DOI: 10.1007/s11042-016-3250-4
|View full text |Cite
|
Sign up to set email alerts
|

General construction for XOR-based visual cryptography and its extended capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…Lin [8] proposed a (n, n) secret sharing scheme where n bit streams were obtained by the random number generation algorithm and hash function and embedded into the carrier image by wet paper code to form n two-level QR codes. Also some scholars shared the secret into several parts based on visual cryptography [9][10][11] and embedded the subsecrets into QR code to generate the twolevel QR code, while there was distortion in the recovery results and the payload was really poor.…”
Section: Introductionmentioning
confidence: 99%
“…Lin [8] proposed a (n, n) secret sharing scheme where n bit streams were obtained by the random number generation algorithm and hash function and embedded into the carrier image by wet paper code to form n two-level QR codes. Also some scholars shared the secret into several parts based on visual cryptography [9][10][11] and embedded the subsecrets into QR code to generate the twolevel QR code, while there was distortion in the recovery results and the payload was really poor.…”
Section: Introductionmentioning
confidence: 99%
“…prevention (Chen,Tsai,&Horng,2013),regionorfullyincrementing (Hu,Shen,Fu,Yu,&Wang, 2016;Chen,2017)andprogressiveschemes (Hou&Quan,2012). All studies mentioned above contribute a lot to the practical applications of VCS.…”
Section: Introductionmentioning
confidence: 99%