A verifiable visual cryptography scheme

Yi Hui Chen*, Ci Wei Lan, Chiao Chih Huang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.

Original languageEnglish
Title of host publicationProceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011
Pages192-195
Number of pages4
DOIs
StatePublished - 2011
Externally publishedYes
Event5th International Conference on Genetic and Evolutionary Computing, ICGEC2011 - Xiamen, China
Duration: 29 08 201101 09 2011

Publication series

NameProceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011

Conference

Conference5th International Conference on Genetic and Evolutionary Computing, ICGEC2011
Country/TerritoryChina
CityXiamen
Period29/08/1101/09/11

Keywords

  • Authentication
  • Visual cryptography

Fingerprint

Dive into the research topics of 'A verifiable visual cryptography scheme'. Together they form a unique fingerprint.

Cite this