Visual Cryptography & Threshold Schemes
By Doug Stinson
Dr. Dobb's Journal April 1998
Example 5: (a) Constructing N1 by taking column two of M1, then column three, and then column one; (b) the encoded pixel P.
Back to Article
Copyright © 1998, Dr. Dobb's Journal