423
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Applications of visual cryptography

&
Pages 429-442 | Received 11 Sep 2010, Accepted 20 Mar 2011, Published online: 28 Oct 2011

References

  • A. Adhikari and S. Sikdar, A new (2, n)-visual threshold scheme for color images, INDOCRYPT 2003, LNCS 2904 (2003), pp. 148–161
  • Yu , B. , Fu , Z. and Fang , L. 2008 . A modified multi-secret sharing visual cryptography scheme . International Conference on Computational Intelligence and Security , : 351 – 354 .
  • Bose , M. and Mukerjee , R. 2006 . Optimal (2, n) visual cryptographic schemes . Des. Codes Crypt. , 40 : 255 – 267 .
  • A. De Santis, On visual cryptography schemes, in Information Theory Workshop 1998, Ireland, 1998, pp. 154–155
  • Hwang , R.J. 2000 . A digital image copyright protection scheme based on visual cryptography . Tamkang J. Sci. Eng. , 3 ( 3 ) : 97 – 106 .
  • Naor , M. and Shamir , A. 1995 . “ Visual cryptography ” . In Advances in Cryptology – EUROCRYPT'94 , LNCS 950 Edited by: De Santis , A. 1 – 12 . Springer-Verlag .
  • Shyu , S.J. , Huang , S.Y. , Lee , Y.K. , Wang , R.Z. and Chen , K. 2007 . Sharing multiple secrets in visual cryptography . Pattern Recognit. , 40 : 3633 – 3651 . doi:10.1016/j.patcog.2007.03.012
  • Y.V. Subba Rao, S. Yulia, U.K. Singh, and B. Chakravarthy, Fingerprint based authentication application using visual cryptography methods, IEEE Tencon (2008), pp. 19–21
  • Wu , H.C. and Chang , C.C. 2005 . Sharing visual multi-secrets using circle shares . Comput. Standards Interfaces , 28 ( 1 ) : 123 – 135 .
  • Yang , C.N. and Chen , T.S. 2005 . Size-adjustable visual secret sharing schemes . IEICE Trans. Fundam. Electronics Commun. Comput. Sci. , E88-A ( 9 ) : 2471 – 2474 .
  • S.Y. Yi, K.I. Chung, C.S. Ryu, K.H. Cha, S.H. Lee, and E.S. Kim, Encryption of cell oriented computer generated hologram by using visual cryptography, in The Pacific Rim Conference on Lasers and Electro-Optics, Vol. 3, 1999, pp. 817–818
  • Z. Zhou, G.R. Arce, and G.D. Crescenzo, Half tone visual cryptography, ICIP 2003, Vol. 1, 2003, pp. 521–524

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.