DocumentCode :
1474948
Title :
Visual cryptography and threshold schemes
Author :
Stinson, Doug
Author_Institution :
Dept. of Comput. Sci., Nebraska Univ., Lincoln, NE, USA
Volume :
18
Issue :
1
fYear :
1999
Firstpage :
13
Lastpage :
16
Abstract :
Visual cryptography is a secret sharing scheme that uses the human visual system to perform computations. In this article, we present some background to traditional secret-sharing schemes, then explain visual schemes, describing some of the basic construction techniques used. topics discussed include: two out of two scheme, two out of n schemes, and graph access structures
Keywords :
cryptography; graph theory; image reconstruction; computation; construction techniques; graph access structures; secret sharing scheme; threshold schemes; two out of n schemes; two out of two scheme; visual cryptography; Cryptography; Galois fields; Image converters; Image recognition; Image reconstruction; Laser noise; Pixel; Plastics; Printers; Printing;
fLanguage :
English
Journal_Title :
Potentials, IEEE
Publisher :
ieee
ISSN :
0278-6648
Type :
jour
DOI :
10.1109/45.747238
Filename :
747238
Link To Document :
بازگشت