1996
DOI: 10.1006/inco.1996.0076
|View full text |Cite
|
Sign up to set email alerts
|

Visual Cryptography for General Access Structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
216
0
4

Year Published

2001
2001
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 503 publications
(220 citation statements)
references
References 8 publications
0
216
0
4
Order By: Relevance
“…Popular visual secret sharing (VSS) schemes, such as those proposed in [1], [6]- [9], allow for visual recovery of the encrypted images [1]. By utilizing the transparent/frosted representation of the shares (usually printed on transparencies) and color mixing principles, the color VSS schemes such as those listed in [12], [14], [15] use the properties of the human visual system (HVS) to force the recognition of a secret message from the required set of shares without additional computations or any knowledge of cryptography [1].…”
Section: Overview Of Color Image Secret Sharing Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Popular visual secret sharing (VSS) schemes, such as those proposed in [1], [6]- [9], allow for visual recovery of the encrypted images [1]. By utilizing the transparent/frosted representation of the shares (usually printed on transparencies) and color mixing principles, the color VSS schemes such as those listed in [12], [14], [15] use the properties of the human visual system (HVS) to force the recognition of a secret message from the required set of shares without additional computations or any knowledge of cryptography [1].…”
Section: Overview Of Color Image Secret Sharing Solutionsmentioning
confidence: 99%
“…The so-called {k, n}-threshold scheme [1], [4]- [9] encrypts the input image by splitting the original content into n noise-like shares. The secret information is recovered only if k or more shares are available for decryption [6]- [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This picture gives an idea of the "arrow" vocabulary used and gives an example of what a user of the system would see when answering a challenge. 4 By virtue of visual secret splitting, absent the slide, the phone appears to be displaying random noise. To answer the challenge, the user would touch each cell and drag in the direction indicated in the table.…”
Section: System Overviewmentioning
confidence: 99%
“…We start by observing that restricting our attention only to schemes that can be expressed with base matrices is without loss of generality. Indeed given any c-color (k, n)-threshold scheme, as proved in [2,7], it is possible to construct a base matrix scheme with the same contrast. Such a base matrix scheme can be easily constructed by first constructing a scheme whose collections C i have the same cardinality (this can be done by duplicating each matrix of collection C i a number of times equal to the least common multiple of the cardinalities of the collections C divided by the cardinality of C i ) and then taking as base matrix for color i the matrix consisting of the concatenation of all the distribution matrices in C i .…”
Section: Upper Bound On the Contrast Of C-color (K N)-threshold Vcsmentioning
confidence: 99%