A description and comparison of three visual extended cryptography algorithms is presented. Currently these methods are often used as a basis for developing more complex schemes. Results related to overlapping shades, pixel expansion, quality of images and shades, and the number of coded images are obtained. In conventional visual cryptography a secret image is encrypted into a set of images that look like random-noise and are distributed to each participant of the scheme. To obtain the secret image the images received must be super-imposed. .In the extended visual cryptography the shades are visually recognizable images. It is concluded that the three methods present particular advantages depending on the application.
CITATION STYLE
Espejel, A., Nakano, M., & Pérez, H. (2012). Comparación entre Varios Esquemas de Criptografía Visual Extendida. Informacion Tecnologica, 23(4), 105–124. https://doi.org/10.4067/S0718-07642012000400013
Mendeley helps you to discover research relevant for your work.