By Topic

Encryption of cell-oriented computer generated hologram by using visual cryptography

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Sang-Yi Yi ; Electron. & Telecommun. Res. Inst., Taejon, South Korea ; Kyo-Il Chung ; Chung-Sang Ryu ; Kwang-Hoon Cha
more authors

A secret management scheme in which important information is distributed to plural members of a group and then can be accessed only with the authorization under the agreements of the members, has been developed. A representative example is the thresholding scheme which is appropriate to apply to a group in which every member has equal accessing right because it has the structure that the secret information is fairly distributed. The encoding and decoding algorithm is commonly realized using a digital processor. Alternatively, it can also be realized by visual cryptography. The later is a good application of the thresholding scheme and has the advantageous characteristics that an exceptional algorithm is not to be needed for decryption. The only thing we have to do is piling up the key image on the encrypted image and confirming the decrypted image by the naked eye. The basic visual cryptograph can be simply realized by distributing an original image to two or more transparent papers.

Published in:

Lasers and Electro-Optics, 1999. CLEO/Pacific Rim '99. The Pacific Rim Conference on  (Volume:3 )

Date of Conference:

Aug. 30 1999-Sept. 3 1999