O'Reilly logo

Visual Cryptography and Secret Image Sharing by Ching-Nung Yang, Stelvio Cimato

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12

Applications of Visual Cryptography

Bernd Borchert and Klaus Reinhardt

Universität Tühingen, Germany

CONTENTS

12.1 Introduction

Naor and Pinkas in their seminal paper [13] suggested to use visual cryptography in a transparency-on-screen version. Their main purpose was authentication, in the sense that an online server is able to authenticate itself to a user sitting in front of the screen. Implicitly, this already suggests ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required