Applications of visual cryptography

被引:2
作者
Rao, Subba Y. V. [1 ]
Roy, Bimal K. [2 ]
机构
[1] Univ Hyderabad, Dept Comp & Informat Sci, Hyderabad, Andhra Pradesh, India
[2] Indian Stat Inst, Appl Stat Unit, Kolkata, India
关键词
visual cryptography; multiple secrets; broadcasting; multi-layer ID cards; fingerprint;
D O I
10.1080/17445760.2011.574628
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography is a secret sharing scheme with only few known applications. This paper first modifies visual cryptography techniques to make them suitable for applications and then proposes some applications that use the modified techniques. These applications are secured communication system that are used to broadcast one or more secrets, multi-layer ID cards and secured fingerprint.
引用
收藏
页码:429 / 442
页数:14
相关论文
共 12 条
[1]  
Adhikari A, 2003, LECT NOTES COMPUT SC, V2904, P148
[2]  
Bin Yu, 2008, 2008 International Conference on Computational Intelligence and Security, P351, DOI 10.1109/CIS.2008.120
[3]   Optimal (2, n) visual cryptographic schemes [J].
Bose, Mausumi ;
Mukerjee, Rahul .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (03) :255-267
[4]   On visual cryptography schemes [J].
De Santis, A .
1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, :154-155
[5]  
Hwang RJ., 2000, TAMKANG J SCI ENG, V3, P97
[6]  
Naor M., 1995, WORKSHOP THEORY APPL, V950, P1, DOI DOI 10.1007/BFB0053419
[7]  
Rao Y. V. Subba, 2008, FINGERPRINT BASED AU, P19
[8]  
Sang-Yi Yi, 1999, Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464), P817, DOI 10.1109/CLEOPR.1999.817849
[9]   Sharing multiple secrets in visual cryptography [J].
Shyu, Shyong Jian ;
Huang, Shih-Yu ;
Lee, Yeuan-Kuen ;
Wang, Ran-Zan ;
Chen, Kun .
PATTERN RECOGNITION, 2007, 40 (12) :3633-3651
[10]   Sharing visual multi-secrets using circle shares [J].
Wu, HC ;
Chang, CC .
COMPUTER STANDARDS & INTERFACES, 2005, 28 (01) :123-135