8
Visual Cryptography and Contrast Bounds
Andreas Klein
Ghent University, Belgium
8.3 Approximate Inclusion Exclusion
8.5 Optimal 3-out-of-n Schemes
8.6 Asymptotic Optimal k-out-of-n Schemes
8.7 Contrast Trade-Offs for Extended Visual Cryptography Schemes
8.1 Introduction
To describe a visual cryptography scheme we encode the encryption of a pixel by Boolean matrices. The rows represent the slides and the columns represent the different subpixels.
For example, the encoding illustrated in Figure 8.1 is described by
To describe the random decision, which must be made when encoding a pixel, ...
Get Visual Cryptography and Secret Image Sharing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.