Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Binary image
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Visual cryptography === [[File:Visual crypto animation demo.gif|frame|right|A demonstration of visual cryptography: when two same-sized images of apparently random black-and-white pixels are superimposed, the [[Wikipedia]] logo appears]] {{main|visual cryptography}} In 1994, [[Moni Naor]] and [[Adi Shamir]] demonstrated a visual [[secret sharing]] scheme, where a binary image was broken up into ''n'' shares so that only someone with all ''n'' shares could decrypt the image, while any {{nowrap|''n'' β 1}} shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares.<ref>{{Cite book |doi = 10.1007/BFb0053419|chapter = Visual cryptography|title = Advances in Cryptology β EUROCRYPT'94|volume = 950|pages = 1β12|series = Lecture Notes in Computer Science|year = 1995|last1 = Naor|first1 = Moni|last2 = Shamir|first2 = Adi|isbn = 978-3-540-60176-0}}</ref> When all ''n'' shares were overlaid, the original image would appear. There are several generalizations of the basic scheme including ''k''-out-of-''n'' visual cryptography,<ref>{{cite journal |doi=10.1023/A:1008280705142|year=1997|last1=Verheul|first1=Eric R.|title=Constructions and Properties of k out of n Visual Secret Sharing Schemes|journal=Designs, Codes and Cryptography|volume=11|issue=2|pages=179β196|last2=Van Tilborg|first2=Henk C. A.|s2cid=479227}}</ref><ref>{{Cite journal |doi = 10.1016/S0304-3975(99)00127-9|title = Extended capabilities for visual cryptography|journal = Theoretical Computer Science|volume = 250|issue = 1β2|pages = 143β161|year = 2001|last1 = Ateniese|first1 = Giuseppe|last2 = Blundo|first2 = Carlo|last3 = Santis|first3 = Alfredo De|last4 = Stinson|first4 = Douglas R.|doi-access = }}</ref> and using opaque sheets but illuminating them by multiple sets of identical illumination patterns under the recording of only one single-pixel detector.<ref>{{cite journal|last1=Jiao|first1=Shuming|last2=Feng|first2=Jun|last3=Gao|first3=Yang|last4=Lei|first4=Ting|last5=Yuan|first5=Xiaocong|title=Visual cryptography in single-pixel imaging|journal=Optics Express|year=2020|volume=28|issue=5|pages=7301β7313|doi=10.1364/OE.383240|pmid=32225961|arxiv=1911.05033|bibcode=2020OExpr..28.7301J |s2cid=207863416}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)