Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Visual cryptography

Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Halftone visual cryptography (HVC) enlarges the area of visual cryptography by the addition of digital halftoning techniques. In… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of… Expand
  • figure 2
  • figure 3
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A (k,n)-threshold visual cryptography scheme (VCS) is a method to encode a secret image SI into n shadow images called shares… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
An extended visual cryptography scheme (EVCS), for an access structure (ΓQual,ΓForb) on a set of n participants, is a technique… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This invention provides a process for preparing 3-exomethylenecepham derivatives represented by the formula wherein R1 is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Abstract. A visual cryptography scheme is a method to encode a secret image SI into shadow images called shares such that certain… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares… Expand
  • figure 1
  • figure 2
  • table 2
  • table 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?