On the Security of a Cheating Immune Visual Secret Sharing Scheme.
Yu-Chi ChenDu-shiau TsaiGwoboa HorngPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- secret sharing scheme
- visual cryptography
- secret sharing
- key management
- encryption scheme
- authentication mechanism
- visual cryptography scheme
- wireless sensor networks
- ad hoc networks
- resource constrained
- visual features
- elliptic curve
- visual information
- image encryption
- public key
- multi party
- privacy preserving
- bit rate
- image processing