Visual Cryptography & Threshold Schemes
By Doug Stinson
Dr. Dobb's Journal April 1998
Figure 2: The original image, two shares, and the reconstructed image: (a) original image; (b) share s1; (c) share s2; (d) s1+s2.
Back to Article
Copyright © 1998, Dr. Dobb's Journal