ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Visual Secret Sharing Schemes
Encyclopedia of Cryptography and Security
◽
10.1007/978-1-4419-5906-5_393
◽
2011
◽
pp. 1363-1364
Author(s):
G. R. Blakley
◽
Gregory Kabatiansky
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
Related Documents
Cited By
References
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
Information Security and Cryptology – ICISC 2008 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-00730-9_6
◽
2009
◽
pp. 84-97
◽
Cited By ~ 1
Author(s):
Miyuki Uno
◽
Mikio Kano
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Access Structure
◽
Visual Secret Sharing
Download Full-text
Towards Shift Tolerant Visual Secret Sharing Schemes
IEEE Transactions on Information Forensics and Security
◽
10.1109/tifs.2011.2117419
◽
2011
◽
Vol 6
(2)
◽
pp. 323-337
◽
Cited By ~ 15
Author(s):
Daoshun Wang
◽
Lin Dong
◽
Xiaobo Li
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares
IEICE Transactions on Information and Systems
◽
10.1587/transinf.2019mup0005
◽
2020
◽
Vol E103.D
(1)
◽
pp. 11-24
Author(s):
Mariko FUJII
◽
Tomoharu SHIBUYA
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
Fault-Tolerant Visual Secret Sharing Schemes without Pixel Expansion
Applied Sciences
◽
10.3390/app6010018
◽
2016
◽
Vol 6
(1)
◽
pp. 18
◽
Cited By ~ 2
Author(s):
Justie Juan
◽
Yung-Chang Chen
◽
Song Guo
Keyword(s):
Secret Sharing
◽
Fault Tolerant
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
◽
Pixel Expansion
Download Full-text
Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88625-9_25
◽
2008
◽
pp. 376-386
◽
Cited By ~ 1
Author(s):
Rabia Sirhindi
◽
Saeed Murtaza
◽
Mehreen Afzal
Keyword(s):
Data Hiding
◽
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
Limiting the visible space visual secret sharing schemes and their application to human identification
Lecture Notes in Computer Science - Advances in Cryptology — ASIACRYPT '96
◽
10.1007/bfb0034846
◽
1996
◽
pp. 185-195
◽
Cited By ~ 6
Author(s):
Kazukuni Kobara
◽
Hideki Imai
Keyword(s):
Secret Sharing
◽
Human Identification
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
A Novel Encoding Method for Ideal Contrast Visual Secret Sharing Schemes with Reversing
2008 International Conference on Computer Science and Software Engineering
◽
10.1109/csse.2008.64
◽
2008
◽
Author(s):
Haibo Zhang
◽
Xiaofei Wang
◽
Youpeng Huang
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
◽
Encoding Method
Download Full-text
Towards Shift Tolerant Visual Secret Sharing Schemes without Pixel Expansion
MATEC Web of Conferences
◽
10.1051/matecconf/20167101002
◽
2016
◽
Vol 71
◽
pp. 01002
Author(s):
Justie Su-Tzu Juan
◽
Yung-Chang Chen
◽
Song Guo
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
◽
Pixel Expansion
Download Full-text
Boolean Composition of Visual Secret Sharing Schemes
Computer Science – Theory and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-642-30642-6_29
◽
2012
◽
pp. 314-325
◽
Cited By ~ 1
Author(s):
Hans Ulrich Simon
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size
Computational Science and Its Applications – ICCSA 2005 - Lecture Notes in Computer Science
◽
10.1007/11424758_3
◽
2005
◽
pp. 19-28
◽
Cited By ~ 4
Author(s):
Ching-Nung Yang
◽
Tse-Shih Chen
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Visual Secret Sharing
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close