Visual Cryptography & Threshold Schemes

By Doug Stinson

Dr. Dobb's Journal April 1998

Figure 4: The original, four shares, and some reconstructed images: (a) share s1; (b) original image; (c) share s2. (d) s1+s2; (e) s3; (f) s3+s4; (g) share s4: (h) s1+s3.

Back to Article


Copyright © 1998, Dr. Dobb's Journal