Two secret sharing schemes based on Boolean operations
- 31 October 2007
- journal article
- Published by Elsevier BV in Pattern Recognition
- Vol. 40 (10), 2776-2785
- https://doi.org/10.1016/j.patcog.2006.11.018
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Secret image sharing with smaller shadow imagesPattern Recognition Letters, 2006
- Sharing and hiding secret images with size constraintPattern Recognition, 2004
- An image-sharing method with user-friendly shadow imagesIEEE Transactions on Circuits and Systems for Video Technology, 2003
- Secret image sharingComputers & Graphics, 2002
- Extended capabilities for visual cryptographyTheoretical Computer Science, 2001
- Sharing secret images using shadow codebooksInformation Sciences, 1998
- Visual Cryptography for General Access StructuresInformation and Computation, 1996
- An explication of secret sharing schemesDesigns, Codes and Cryptography, 1992
- Secret sharing scheme realizing general access structureElectronics and Communications in Japan (Part III: Fundamental Electronic Science), 1989
- Safeguarding cryptographic keysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1979