On the relation of random grid and deterministic visual cryptography

R De Prisco, A De Santis - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Visual cryptography is a special type of secret sharing. Two models of visual cryptography
have been independently studied: 1) deterministic visual cryptography, introduced by Naor …

Combination of Sharing Matrix and Image Encryption for Lossless -Secret Image Sharing

L Bao, S Yi, Y Zhou - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
This paper first introduces a (k, n)-sharing matrix S (k, n) and its generation algorithm.
Mathematical analysis is provided to show its potential for secret image sharing. Combining …

Cascade forward back-propagation neural network based group authentication using (n, n) secret sharing scheme

S Narad, P Chavan - Procedia Computer Science, 2016 - Elsevier
Authentication is the important issue over the internet. It results in need of robust security
services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with …

Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images

A Adhikari - Designs, codes and cryptography, 2014 - Springer
Though the monochrome (black and white) visual cryptography has a very rich literature, a
very few papers have been published for the construction of general access structure. In this …

Maximal contrast color visual secret sharing schemes

S Dutta, A Adhikari, S Ruj - Designs, Codes and Cryptography, 2019 - Springer
The transition of visual secret sharing from a black & white secret image to a color image is
not straight-forward. There are several models of color superposition principle. In this paper …

[HTML][HTML] Color visual cryptography schemes for black and white secret images

R De Prisco, A De Santis - Theoretical Computer Science, 2013 - Elsevier
In this paper we propose the use of colors to improve visual cryptography schemes for black-
and-white secret images. The resulting model is called colored-black-and-white visual …

Color visual cryptography schemes using linear algebraic techniques over rings

S Dutta, MK Sardar, A Adhikari, S Ruj… - … Conference on Information …, 2020 - Springer
The research on color Visual Cryptographic Scheme (VCS) is much more difficult than that of
the black and white VCS. This is essentially because of the fact that in color VCS, the rule for …

[图书][B] Improving image quality in visual cryptography

B Yan, Y Xiang, G Hua - 2020 - Springer
Visual cryptography (VC) is a new form of secret sharing technique, where no computation is
needed for decryption. The decryption can be done by stacking the shares or simple …

Basic visual cryptography algorithms

B Yan, Y Xiang, G Hua, B Yan, Y Xiang… - Improving image quality in …, 2020 - Springer
This chapter aims to help the readers to get familiar with the classical VC algorithms. These
algorithms are also stepstones for developing more complicated algorithms in later chapters …

Secret sharing scheme for group authentication—A review

SK Narad, MR Sayankar, SV Alone… - 2017 International …, 2017 - ieeexplore.ieee.org
User authentication is the most important security services for communication purpose.
Group Authentication authenticates all users belonging to the same group is proposed in …