Two secret sharing schemes based on Boolean operations

D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …

Visual secret sharing for multiple secrets

JB Feng, HC Wu, CS Tsai, YF Chang, YP Chu - Pattern Recognition, 2008 - Elsevier
Conventional visual secret sharing schemes are designed for a single secret image so it is
inefficient to generate numerous share images for multiple secret images simultaneously …

Colour visual cryptography schemes

F Liu, CK Wu, XJ Lin - IET Information Security, 2008 - IET
Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the
encryption of a secret image into n shares that are distributed to n participants. The beauty of …

The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images

M Iwamoto, H Yamamoto - IEICE transactions on fundamentals of …, 2002 - search.ieice.org
In this paper, a method is proposed to construct an n-out-of-n visual secret sharing scheme
for gray-scale images, for short an (n, n)-VSS-GS scheme, which is optimal in the sense of …

Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images

A Adhikari - Designs, codes and cryptography, 2014 - Springer
Though the monochrome (black and white) visual cryptography has a very rich literature, a
very few papers have been published for the construction of general access structure. In this …

Secure information display with limited viewing zone by use of multi-color visual cryptography

H Yamamoto, Y Hayasaki, N Nishida - Optics express, 2004 - opg.optica.org
We propose a display technique that ensures security of visual information by use of visual
cryptography. A displayed image appears as a completely random pattern unless viewed …

A weak security notion for visual secret sharing schemes

M Iwamoto - IEEE Transactions on Information Forensics and …, 2011 - ieeexplore.ieee.org
We propose a weak security notion for visual secret sharing (VSS) schemes. Under such a
weak security notion, VSS schemes are designed to be secure against attackers' eyesight …

A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme

H Koga - International Conference on the Theory and …, 2002 - Springer
This paper provides a new method for construction of the generating (or basis) matrices of
the (t, n)-threshold visual secret sharing scheme ((t, n)-VSSS) for any n≥ 2 and 2≤ t≤ n …

Optimal (k, n) visual cryptographic schemes for general k

M Bose, R Mukerjee - Designs, Codes and Cryptography, 2010 - Springer
In (k, n) visual cryptographic schemes (VCS), a secret image is encrypted into n pages of
cipher text, each printed on a transparency sheet, which are distributed among n …

Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures

M Iwamoto, H Yamamoto, H Ogawa - IEICE transactions on …, 2007 - search.ieice.org
It is known that for any general access structure, a secret sharing scheme (SSS) can be
constructed from an (m, m)-threshold scheme by using the so-called cumulative map or from …