Visual Cryptography & Threshold Schemes

By Doug Stinson

Dr. Dobb's Journal April 1998

Figure 2: The original image, two shares, and the reconstructed image: (a) original image; (b) share s1; (c) share s2; (d) s1+s2.

Back to Article


Copyright © 1998, Dr. Dobb's Journal