![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
On the Equivalence of Two Definitions of Visual Cryptography Scheme
A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. To the best of our knowledge, th...
-
Chapter and Conference Paper
Multi-pixel Encryption Visual Cryptography
A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. In their pioneer work, Naor and ...
-
Chapter and Conference Paper
Flexible Visual Cryptography Scheme without Distortion
For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...
-
Chapter and Conference Paper
Threshold Secret Image Sharing
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In...
-
Chapter and Conference Paper
Visual Cryptography for Natural Images and Visual Voting
Visual cryptography is a type of secret sharing which encodes a secret image into several shadow images in such a way that the stacking of certain images printed on transparencies will reveal the secret. The d...
-
Chapter
Flexible Visual Cryptography Scheme and Its Application
For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...
-
Chapter and Conference Paper
On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties
In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\) ...
-
Chapter and Conference Paper
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion
In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...
-
Chapter and Conference Paper
Privacy Monitor
This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful info...
-
Chapter and Conference Paper
Temporal Integration Based Visual Cryptography Scheme and Its Application
Visual cryptography scheme (VCS) is an image secret sharing method which exploits the spatial responds characteristics of Human visual system (HVS). Applications of traditional OR and XOR based VCSs are seriou...
-
Chapter and Conference Paper
Information Security Display Technology with Multi-view Effect
Information security is arousing wide attention of the world. Apart from the traditional attack on transmission process, threats specific to display terminals should not be ignored as well. In this paper, we i...