Login / Signup

Secure display by use of multiple decoding masks based on visual cryptography.

Hirotsugu YamamotoShiro Suyama
Published in: IAS (2011)
Keyphrases
  • visual cryptography
  • post processing
  • secret sharing scheme
  • secret sharing