O'Reilly logo

Handbook of Image and Video Processing, 2nd Edition by Alan C. Bovik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

9.6

Visual Cryptography: The Combinatorial and Halftoning Frameworks

Gonzalo R. Arce,     University of Delaware

Giovanni Di Crescenzo,     Telcordia Technologies

Zhi Zhou,     Samsung Information Systems America

Introduction

1.1 Visual Cryptography: The Combinatorial Framework

1.2 Visual Cryptography: The Halftoning Framework

1.3 This Chapter

2 Visual Secret Sharing

2.1 Notion and Formal Definitions

2.2 Some Constructions

3 Visual Steganography

3.1 Combinatorial Techniques

3.2 Halftoning Techniques

3.3 Simulation Results

4 Other Work and Conclusions

References

1 Introduction

Visual cryptography (VC), introduced in [15], is a recently emerging research area in cryptography, where images are used as an encoding of possibly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required