Title :
Visual cryptography and threshold schemes
Author_Institution :
Dept. of Comput. Sci., Nebraska Univ., Lincoln, NE, USA
Abstract :
Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used. topics discussed include: two out of two scheme, two out of n schemes, and graph access structures
Keywords :
cryptography; graph theory; image reconstruction; computation; construction techniques; graph access structures; secret sharing scheme; threshold schemes; two out of n schemes; two out of two scheme; visual cryptography; Cryptography; Galois fields; Image converters; Image recognition; Image reconstruction; Laser noise; Pixel; Plastics; Printers; Printing;
Journal_Title :
Potentials, IEEE