Login / Signup

How to construct progressive visual cryptography schemes.

Wenjuan WangHachiro Fujita
Published in: ICASSP (2015)
Keyphrases
  • visual cryptography
  • visual cryptography scheme
  • secret sharing
  • secret sharing scheme
  • secret image
  • computer vision
  • multiresolution
  • end to end