Login / Signup

Bounds for visual cryptography schemes.

Hossein HajiabolhassanAbbas Cheraghi
Published in: Discret. Appl. Math. (2010)
Keyphrases
  • visual cryptography
  • visual cryptography scheme
  • secret sharing
  • secret sharing scheme
  • co occurrence
  • image processing
  • face recognition
  • image data
  • multi party
  • human eyes