<--- Back to Details
First PageDocument Content
Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage
Date: 2008-12-18 11:45:43
Visual cryptography
Cryptographic protocols
Key management
Digital photography
Image processing
Secret sharing
Pixel
Computing
Steganography
Cryptography
Computer graphics
Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 122,11 KB

Share Document on Facebook

Similar Documents

Issues in Informing Science and Information Technology Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication

DocID: 1u8BO - View Document

Public key infrastructure / Microsoft InfoPath / Key management / Public-key cryptography / Visual Studio Tools for Office / SharePoint / Visual Studio Tools for Applications / Microsoft Office / Microsoft Visual Studio / Microsoft / Code signing / Active Directory

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCoding Options for

DocID: 1pLlO - View Document

Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

DocID: 1pEB9 - View Document

Digital typography / Cryptography / Visual cryptography / RSA / PostScript / Python / Command-line interface / Moni Naor / C / Adi Shamir

VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

DocID: 1oO3Z - View Document

Cryptography / Wearable computers / Augmented reality / Display technology / Eyewear / Google Glass / Plaintext / Visual cryptography / Data Encryption Standard / Seiko Epson / RSA

Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices Sarah J. Andrabi Michael K. Reiter

DocID: 1ozhX - View Document