Secure Masks for Visual Cryptography.
Jonathan WeirWeiQi YanPublished in: Trans. Data Hiding Multim. Secur. (2010)
Keyphrases
- visual cryptography
- secret sharing
- secret sharing scheme
- visual cryptography scheme
- key management
- encryption scheme
- secret image
- multi party
- edge detection
- resource constrained
- computer vision
- lightweight
- secret image sharing
- ad hoc networks
- motion estimation
- authentication scheme
- human eyes
- wireless sensor networks
- image processing