Tagged visual cryptography with access control.
Yi-Hui ChenChi-Shiang ChanPo-Yu HsuWei-Lin HuangPublished in: ICME Workshops (2014)
Keyphrases
- access control
- visual cryptography
- secret sharing scheme
- dynamic access control
- security policies
- data security
- security mechanisms
- access control policies
- role based access control
- secret image
- data protection
- access control models
- secret sharing
- database
- key management
- spatial domain
- access control mechanism
- access control systems
- wireless sensor networks