Skip to main content

Visual Cryptography

  • Reference work entry
Encyclopedia of Multimedia
  • 216 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. M. Naor and A. Shamir, “Visual Cryptography,” Lecture Notes in Computer Science, Vol. 950, 1994, pp. 1–12.

    Google Scholar 

  2. P.-A. Eisen and D.-R. Stinson, “Threshold Visual Cryptography Schemes with Specified Levels of Reconstructed Pixels,” Design, Codes and Cryptography, Vol. 25, No. 1, January 2002, pp. 15–61.

    Article  MATH  MathSciNet  Google Scholar 

  3. C.-N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, No. 4, March 2004, pp. 481–494.

    Article  Google Scholar 

Download references

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this entry

Cite this entry

(2006). Visual Cryptography. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_259

Download citation

Publish with us

Policies and ethics