Login / Signup
A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes.
Kannan Karthik
Dimitrios Hatzinakos
Published in:
Security and Management (2007)
Keyphrases
</>
secret sharing
visual cryptography scheme
secret sharing scheme
multi party
visual cryptography
image segmentation
motion estimation
post processing
data access
secret image