搜索结果: 1-10 共查到“军队指挥学 visual cryptography”相关记录10条 . 查询时间(0.092 秒)
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
secret sharing visual cryptography
2014/3/5
Visual cryptography is a special type of secret sharing. Two models of visual cryptography have been independently studied: deterministic visual cryptography, introduced by Naor and Shamir, and random...
Encrypting More Information in Visual Cryptography Scheme
Secret Sharing Visual Cryptography Covert data Sub-channel
2011/7/25
The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot ...
Encrypting More Information in Visual Cryptography Scheme
secret-key cryptography / Visual Cryptography
2012/3/27
The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot ...
Optimal XOR based (2,n)-Visual Cryptography Schemes
Secret sharing Visual cryptography scheme Coding theory
2010/11/2
A (2,n)-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptograp...
Embedded Extended Visual Cryptography Schemes
Secret sharing Embedded extended visual cryptography scheme
2010/8/17
Visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into n shares that distributed to n participants. The beauty of such scheme is that a se...
Recursive Information Hiding in Visual Cryptography
applications visual cryptography secret sharing recursive hiding of secrets information efficiency 3 out of 5 secret sharing
2010/7/13
Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret sharing. The idea used is ...
A Recursive Threshold Visual Cryptography Scheme
recursive hiding of secrets visual cryptography secret sharing
2009/6/11
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger sec...
On the Security of a Visual Cryptography Scheme for Color Images
visual cryptography secret sharing dithering
2009/6/4
In Pattern Recognition, vol. 36, 2003, Hou proposed a four-share visual cryptography
scheme for color images. The scheme splits a secret image into four shares, the black mask and
the other three sh...
Almost Ideal Contrast Visual Cryptography with Reversing
Ideal Contrast Visual Cryptography Reversing
2009/4/1
Almost Ideal Contrast Visual Cryptography with Reversing.
Visual Cryptography Schemes with Optimal Pixel Expansion
Visual cryptography Pixel expansion
2008/11/21
A visual cryptography scheme encodes a black & white secret image
into n shadow images called shares which are distributed to the n participants.
Such shares are such that only qualified subsets of ...