Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,750,088 papers from all fields of science
Search
Sign In
Create Free Account
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
One-time pad
Outline of cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Cheating immune visual cryptography scheme
Feng Liu
,
Chuankun Wu
,
Xi Jun Lin
IET Information Security
2011
Corpus ID: 2068368
Most cheating immune visual cryptography schemes (CIVCS) are based on a traditional visual cryptography scheme (VCS) and are…
Expand
Review
2010
Review
2010
Survey of Visual Cryptography Schemes
P. S. Revenkar
,
A. Anjum
,
W. Gandhare
2010
Corpus ID: 17440309
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes…
Expand
2010
2010
New Visual Cryptography Algorithm For Colored Image
S. Abdulla
arXiv.org
2010
Corpus ID: 13987998
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple…
Expand
Highly Cited
2009
Highly Cited
2009
A Novel Visual Cryptography Scheme
Debasish Jena
,
S. K. Jena
American Control Conference
2009
Corpus ID: 15265752
Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in…
Expand
2009
2009
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh
,
S. Kak
IACR Cryptology ePrint Archive
2009
Corpus ID: 9688268
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes…
Expand
2009
2009
A Watermarking Technique based on Visual Cryptography
B. Surekha
,
G. Swamy
,
K. S. Rao
,
A. Kumar
2009
Corpus ID: 123993023
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the…
Expand
Highly Cited
2008
Highly Cited
2008
Color Visual Cryptography Scheme Using Meaningful Shares
Hsien-Chu Wu
,
Hao-Cheng Wang
,
Ruihua Yu
Eighth International Conference on Intelligent…
2008
Corpus ID: 5200590
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The secret image can be…
Expand
Highly Cited
2007
Highly Cited
2007
Segment-based Visual Cryptography
Bernd Borchert
2007
Corpus ID: 18242874
A version of Visual Cryptography is presented which is not pixel-based but segment-based. It is used to encrypt messages…
Expand
2006
2006
Visual Cryptography Based on Void-And-Cluster Halftoning Technique
E. Myodo
,
S. Sakazawa
,
Y. Takishima
International Conference on Information Photonics
2006
Corpus ID: 17819195
In this paper, visual cryptography for halftone images is proposed, which uses threshold arrays generated by a void-and-cluster…
Expand
2000
2000
A neural network approach for visual cryptography
T. Yue
,
Suchen Chiang
Proceedings of the IEEE-INNS-ENNS International…
2000
Corpus ID: 17121612
Visual cryptography finds many applications in the cryptographic field such as key management, message concealment, authorization…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE