@inproceedings{cdc5494113424b5fa8c569483524ad12,
title = "A verifiable visual cryptography scheme",
abstract = "Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.",
keywords = "Authentication, Visual cryptography",
author = "Chen, {Yi Hui} and Lan, {Ci Wei} and Huang, {Chiao Chih}",
year = "2011",
doi = "10.1109/ICGEC.2011.53",
language = "英语",
isbn = "9780769544496",
series = "Proceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011",
pages = "192--195",
booktitle = "Proceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011",
note = "5th International Conference on Genetic and Evolutionary Computing, ICGEC2011 ; Conference date: 29-08-2011 Through 01-09-2011",
}