Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility. © 2011 IEEE.
Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
Raymond Wu, Jie Lu
ITA Conference 2007
Pradip Bose
VTS 1998
Ehud Altman, Kenneth R. Brown, et al.
PRX Quantum