Login / Signup
Password Protected Visual Cryptography via Cellular Automaton Rule 30.
Roman V. Yampolskiy
Jovan David Rebolledo Méndez
Musa Hindi
Published in:
Trans. Data Hiding Multim. Secur. (2014)
Keyphrases
</>
cellular automaton
visual cryptography
cellular automata
secret sharing scheme
visual cryptography scheme
finite state machines
data protection
secret image
information security
image processing
computational complexity
resource constrained
secret sharing
secret image sharing