Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1088898 - MaRDI portal

scientific article; zbMATH DE number 1088898

From MaRDI portal
Publication:4365722

zbMath0878.94048MaRDI QIDQ4365722

Moni Naor, Adi Shamir

Publication date: 18 November 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Unnamed ItemBoolean operations-based visual secret sharing for general access structuresA study for security of visual cryptographyQuantum meaningful visual cryptographyMultiparty verification in image secret sharingTowards cheat-preventing in block-based progressive visual cryptography for general access structuresApproximate Degree, Secret Sharing, and Concentration PhenomenaOn the Construction of (n, k)-schemes of Visual Cryptography Using a Class of Linear Hash Functions Over a Binary FieldVisual cryptography scheme on graphs with $m^{*}(G)=4$A New Approach to Image Sharing with High-Security Threshold StructureAn encryption algorithm for grey-scale image based on bit-plane decomposition and diffuse representationThree \((t, n )\)-secret image sharing schemes based on homogeneous linear recursionMultiple images encryption based on 3D scrambling and hyper-chaotic systemEfficient visual secret sharing scheme for color imagesIdeal contrast visual cryptography schemes with reversingVisual cryptography for grey level imagesHierarchical Visual Secret Sharing Scheme Using SteganographyConstructions and analysis of some efficient \(t\)-\((k,n)^\ast\)-visual cryptographic schemes using linear algebraic techniquesTwo secret sharing schemes based on Boolean operationsNew Results on Visual CryptographyBoolean Composition of Visual Secret Sharing SchemesOptimal \((k, n)\) visual cryptographic schemes for general \(k\)Optimal \((2, n )\) visual cryptographic schemesA multiple-level visual secret-sharing scheme without image size expansionImage encryption by random gridsA Survey on some Applications of Graph Theory in CryptographySteganography based image sharing with reversibilityRegion splitting visual cryptography using random gridsRobust progressive block based visual cryptography with chaotic mapVisual cryptographic schemes using combined Boolean operationsVisual cryptography schemes with optimal pixel expansionRamp secret image sharingResearch on a novel construction of probabilistic visual cryptography scheme \((k, n, 0, 1, 1)\)-PVCS for threshold access structuresA reversible steganography scheme of secret image sharing based on cellular automata and least significant bits constructionPerfect contrast XOR-based visual cryptography schemes via linear algebraAn information-theoretic model for steganographyExtended visual cryptography schemesA cheating prevention scheme for binary visual cryptography with homogeneous secret imagesEfficient multi-secret image sharing based on Boolean operationsGraph access structures with optimal pixel expansion threeColor visual cryptography schemes for black and white secret imagesSecure Two-Party Computation: A Visual WayMeasure-Independent Characterization of Contrast Optimal Visual Cryptography SchemesMaximal contrast color visual secret sharing schemesPrivate Visual Share-Homomorphic Computation and Randomness Reduction in Visual CryptographyRevisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic SchemesLinear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color imagesExtended color visual cryptography for black and white secret imageVisual cryptography based on ghost imaging and Hadamard transform\((2,n)\) secret sharing scheme for gray and color images based on Boolean operationOn \({(k,n)^\ast}\)-visual cryptography schemeMeaningful share generation for increased number of secrets in visual secret-sharing schemePrivate computation using a PEZ dispenser.Coloured visual cryptography using fixed size meaningful shareVisual cryptograms of random grids for threshold access structuresColored visual cryptography scheme based on additive color mixingSharing secrets in stego images with authenticationProbabilistic secret sharingFake and dishonest participant location scheme in secret image sharingSecret sharing with multi-cover adaptive steganographyOn the information rate of secret sharing schemesVisual secret sharing for multiple secretsA discussion on the relationship between probabilistic visual cryptography and random gridDistortionless visual multi-secret sharing based on random gridFriendly progressive visual secret sharingConstruction of a \((k,n)\)-visual cryptography schemeSecure computation without computersA multisecret sharing scheme for color images based on cellular automataPrevention of cheating in visual cryptography by using coherent patternsComputing transparently: The independent sets in a graphOptimal colored threshold visual cryptography schemesProbabilistic visual secret sharing schemes for grey-scale images and color imagesVisual multiple secret sharing based upon turning and flippingBit-level based secret sharing for image encryptionA secure scheme to share secret color imagesPolling with Physical Envelopes: A Rigorous Analysis of a Human-Centric ProtocolReduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operationOn general construction for extended visual cryptography schemesSharing a verifiable secret image using two shadowsVisual secret sharing by random grids revisitedOwner-customer right protection mechanism using a watermarking scheme and a watermarking protocolA general method for construction of \((t, n)\)-threshold visual secret sharing schemes for color imagesProbabilistic (n, n) Visual Secret Sharing Scheme for Grayscale ImagesA new definition of the contrast of visual cryptography schemeNew extended visual cryptography schemes with clearer shadow imagesImage hiding in time-averaged Moiré gratings on finite element gridsSharing multiple secrets in visual cryptographyVCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approachesSecret image sharing scheme with threshold changeable capabilitySecret image sharing based on cellular automata and steganographyImage inpainting-based behavior image secret sharingA compressed secret image sharing method with shadow image verification capabilityA novel secret sharing scheme using multiple share imagesThe alignment problem of visual cryptography schemesOn the security of a visual cryptography scheme for color imagesImage encryption by multiple random gridsExploiting the Error Correction Mechanism in QR Codes for Secret SharingColored visual cryptography without color darkeningBounded Indistinguishability and the Complexity of Recovering SecretsMTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficultyRandomness in secret sharing and visual cryptography schemesA secret sharing scheme for quantum gray and color images based on encryptionContrast-optimal k out of n secret sharing schemes in visual cryptographyCooperative secret sharing using QR codes and symmetric keysSecurity protection using two different image shadows with authenticationXOR-based visual cryptography schemesAn explicit formula and its fast algorithm for a class of symmetric balanced incomplete block designsExtended capabilities for visual cryptographyQuantum verifiable protocol for secure modulo zero-sum randomnessUnnamed Item