Sciweavers

961 search results - page 1 / 193
» Visual Cryptography on Graphs
Sort
View
COCOON
2008
Springer
13 years 6 months ago
Visual Cryptography on Graphs
In this paper, we consider a new visual cryptography scheme that allows for sharing of multiple secret images on graphs: we are given an arbitrary graph (V, E) where every node an...
Steve Lu, Daniel Manchala, Rafail Ostrovsky
VIROLOGY
2010
136views more  VIROLOGY 2010»
12 years 11 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
DCC
2006
IEEE
14 years 4 months ago
Cheating in Visual Cryptography
Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
IJCNN
2000
IEEE
13 years 9 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang