… Multi-secretsharingvisual cryptography scheme based on … Deterministic extendedvisual cryptographicschemes for … Authenticating visualcryptographyshares using 2D barcodes[…
… This multi-secretsharingscheme can be used to distribute and reconstruct secret key in a company consisting of a number of departments whose members are classified and allocated …
… sharing and recovering ways of the verification image, a verifiable VisualCryptographyScheme … VisualCryptography (VC) with non-expanded shadow images Hilbert-curve approach[C]…
… Abstract: A cheater detectable VisualCryptographyScheme(VCS) … image is introduced in this paper. Compared to previous … Multi-secretsharing threshold visualcryptography [C]. CIS …
… secret sharingscheme … extended with public value, and aggregate embedding method of Chinese remainder theorem to construct two kinds of hierarchical multi-secretsharingschemes …
… New multi-secretsharingscheme based on super increasing sequence for level-ordered … (t,n) multi-secretsharingschemeextended from Harn-Hsu’s scheme. Eurasip Journal on …