Sign in
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku.
Yung-Chen Chou
Chih-Hung Lin
Pao-Ching Li
Yu-Chiang Li
Published in:
IIH-MSP (2010)
Keyphrases
</>
secret sharing scheme
access structure
secret sharing
key management
encryption scheme
visual cryptography
visual cryptography scheme
black and white
high quality
computational complexity
ground truth
natural images