Basic visual cryptography algorithms

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter aims to help the readers to get familiar with the classical VC algorithms. These algorithms are also stepstones for developing more complicated algorithms in later chapters. First, we introduce the general framework of VC, such as access structure and general requirements (security and contrast). Then, we introduce the classical deterministic VC with pixel expansion as developed in Naor and Shamir’s seminal work. Next, the size-invariant algorithms are summarized, including the probabilistic VC and random grid VC. Some examples will be discussed for the readers that are new to this topic. Finally, various security levels in visual cryptography will be discussed, including strong security and several weak securities.

Cite

CITATION STYLE

APA

Yan, B., Xiang, Y., & Hua, G. (2020). Basic visual cryptography algorithms. In Signals and Communication Technology (pp. 15–33). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-13-8289-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free