Secure masks for visual cryptography

WeiQi Yan

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In this journal article, we take multiple secrets into consideration and generate a key share for all the secrets; correspondingly, we share each secret using this key share. The secrets are recovered when the key is superimposed on the combined share in different locations using the proposed scheme. Also discussed and illustrated within this paper is how to embed a share of visual cryptography into halftone and colour images. The remaining share is used as a key share in order to perform the decryption. It is also worth noting that no information regarding the secrets is leaked in any of our proposed schemes. We provide the corresponding results in this paper.
Original languageEnglish
Pages (from-to)11-20
Number of pages10
JournalSpringer Transactions on DHMMS
Volume5
Publication statusPublished - Dec 2010

Fingerprint Dive into the research topics of 'Secure masks for visual cryptography'. Together they form a unique fingerprint.

  • Cite this