Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility. © 2011 IEEE.
Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
Pradip Bose
VTS 1998
Raymond Wu, Jie Lu
ITA Conference 2007
Ehud Altman, Kenneth R. Brown, et al.
PRX Quantum