Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,378,798 papers from all fields of science
Search
Sign In
Create Free Account
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
One-time pad
Outline of cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Cheating immune visual cryptography scheme
Feng Liu
,
Chuankun Wu
,
Xi Jun Lin
IET Information Security
2011
Corpus ID: 2068368
Most cheating immune visual cryptography schemes (CIVCS) are based on a traditional visual cryptography scheme (VCS) and are…
Expand
Review
2010
Review
2010
Survey of Visual Cryptography Schemes
P. S. Revenkar
,
A. Anjum
,
W. Gandhare
2010
Corpus ID: 17440309
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes…
Expand
2010
2010
Pixel sieve method for secret sharing & visual cryptography
A. Incze
9th RoEduNet IEEE International Conference
2010
Corpus ID: 27430462
Secret sharing and visual cryptography although they are two different type of cryptographic methods most of the time they are…
Expand
2010
2010
Resolution variant visual cryptography for street view of Google Maps
J. Weir
,
Weiqi Yan
Proceedings of IEEE International Symposium on…
2010
Corpus ID: 1559721
Resolution variant visual cryptography takes the idea of using a single share of visual cryptography (VC) to recover a secret…
Expand
Highly Cited
2009
Highly Cited
2009
A Novel Visual Cryptography Scheme
Debasish Jena
,
S. K. Jena
American Control Conference
2009
Corpus ID: 15265752
Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in…
Expand
2009
2009
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh
,
S. Kak
IACR Cryptology ePrint Archive
2009
Corpus ID: 9688268
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes…
Expand
2009
2009
A Watermarking Technique based on Visual Cryptography
B. Surekha
,
G. Swamy
,
K. S. Rao
,
A. Kumar
2009
Corpus ID: 123993023
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the…
Expand
Highly Cited
2008
Highly Cited
2008
Color Visual Cryptography Scheme Using Meaningful Shares
Hsien-Chu Wu
,
Hao-Cheng Wang
,
Ruihua Yu
Eighth International Conference on Intelligent…
2008
Corpus ID: 5200590
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The secret image can be…
Expand
2007
2007
Self Watermarking based on Visual Cryptography
Mahmoud Hassan
,
M. A. Khalili
2007
Corpus ID: 37984468
— We are proposing a simple watermarking method based on visual cryptography. The method is based on selection of specific pixels…
Expand
2006
2006
Visual Cryptography Based on Void-And-Cluster Halftoning Technique
E. Myodo
,
S. Sakazawa
,
Y. Takishima
International Conference on Information Photonics
2006
Corpus ID: 17819195
In this paper, visual cryptography for halftone images is proposed, which uses threshold arrays generated by a void-and-cluster…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE