<--- Back to Details
First PageDocument Content
Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage
Date: 2008-12-18 11:45:43
Visual cryptography
Cryptographic protocols
Key management
Digital photography
Image processing
Secret sharing
Pixel
Computing
Steganography
Cryptography
Computer graphics
Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 122,11 KB

Share Document on Facebook

Similar Documents

Computing / Concurrent computing / Distributed computing / Image compression / Open formats / Computer networking / Content delivery networks / Fastly / Internet security / Portable Network Graphics / WebP

Fastly Image Optimizer Serve pixel-perfect, bandwidth efficient images on the fly Your site’s performance isn’t just about moving content closer to end users, it’s also about ensuring images on every page render as

DocID: 1xVTn - View Document

Touchscreen mobile phones / Chemistry / Pixel 2 / Pixel / Nature / Mercury / Restriction of Hazardous Substances Directive / AC adapter / Electric battery / Universe

Google Pixel 2 XL Product environmental report Model G011C, introduced October 4, 2017 Environmental

DocID: 1xVFZ - View Document

PDF Document

DocID: 1xR6D - View Document

PDF Document

DocID: 1xK0Y - View Document

PDF Document

DocID: 1xnNB - View Document