About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Conference paper
A verifiable visual cryptography scheme
Abstract
Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility. © 2011 IEEE.