Get full access to Visual Cryptography and Secret Image Sharing and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
List of Figures
List of Tables
1 Visual Cryptography from Halftone Error DiffusionGonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo
1.1.1 Visual Cryptography
1.1.2 Halftone Visual Cryptography
1.1.3 Blue Noise Error Diffusion
1.2 Visual Secret Sharing
1.2.1 Notion and Formal Definitions
1.2.2 Construction of VSS Scheme
1.3 Halftone VSS Construction Using Error Diffusion
1.3.1 Share Structure
1.3.2 Distribution of SIPs and ABPs
1.3.3 Generation of Halftone Shares via Error Diffusion
1.4 Halftone VSS Construction Using Parallel Error Diffusion
1.5 Quality of Halftone Shares
1.6.1 Improvement of Image Quality
1.6.2 Comparison with Other Methods
1.6.3 Image Decoding
1.7 Simulation ...
Get Visual Cryptography and Secret Image Sharing now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.