O'Reilly logo

Visual Cryptography and Secret Image Sharing by Ching-Nung Yang, Stelvio Cimato

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8

Visual Cryptography and Contrast Bounds

Andreas Klein

Ghent University, Belgium

8.1 Introduction

To describe a visual cryptography scheme we encode the encryption of a pixel by Boolean matrices. The rows represent the slides and the columns represent the different subpixels.

For example, the encoding illustrated in Figure 8.1 is described by

M=(010100110110).

To describe the random decision, which must be made when encoding a pixel, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required