Visual Cryptography & Threshold Schemes
By Doug Stinson
Dr. Dobb's Journal April 1998
Figure 4: The original, four shares, and some reconstructed images: (a) share s1; (b) original image; (c) share s2. (d) s1+s2; (e) s3; (f) s3+s4; (g) share s4: (h) s1+s3.
Back to Article
Copyright © 1998, Dr. Dobb's Journal