Visual Cryptography & Threshold Schemes

By Doug Stinson

Dr. Dobb's Journal April 1998

Example 5: (a) Constructing N1 by taking column two of M1, then column three, and then column one; (b) the encoded pixel P.

Back to Article


Copyright © 1998, Dr. Dobb's Journal