Visual Cryptography

@inproceedings{Naor1994VisualC,
  title={Visual Cryptography},
  author={M. Naor and A. Shamir},
  booktitle={EUROCRYPT},
  year={1994}
}
  • M. Naor, A. Shamir
  • Published in EUROCRYPT 1994
  • Computer Science
  • In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant of the k out of n secret sharing problem, in which a dealer provides a transparency to each one of the n users; any k of them can see the image by stacking their transparencies, but any k-1 of them gain no information about it. 

    Figures and Topics from this paper.

    Extended visual cryptography schemes
    • 17
    • Open Access
    Various Visual Secret Sharing Schemes- A Review
    • 1
    A Secure Visual Cryptography for Color Images
    • 1
    • Open Access
    On visual cryptography schemes
    • 6
    Hiding Multiple Watermarks in Transparencies of Visual Cryptography
    • 8

    References

    Publications referenced by this paper.
    SHOWING 1-6 OF 6 REFERENCES
    New Hash Functions and Their Use in Authentication and Set Equality
    • 1,279
    • Open Access
    Universal Classes of Hash Functions
    • 2,428
    • Open Access
    Simple Construction of Almost k-wise Independent Random Variables
    • 374
    • Highly Influential
    • Open Access
    Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs
    • 258
    • Open Access
    Small-Bias Probability Spaces: Efficient Constructions and Applications
    • 478
    • Open Access
    The Theory of Error-Correcting Codes
    • 7,215
    • Open Access