Visual Cryptography Models, Issues, Applications and New Directions

Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives.

Saved in:
Bibliographic Details
Published inInnovative Security Solutions for Information Technology and Communications pp. 20 - 39
Main Authors D’Arco, Paolo, De Prisco, Roberto
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2016
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783319472379
3319472372
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-47238-6_2

Cover

Abstract Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives.
AbstractList Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives.
Author De Prisco, Roberto
D’Arco, Paolo
Author_xml – sequence: 1
  givenname: Paolo
  surname: D’Arco
  fullname: D’Arco, Paolo
  email: pdarco@unisa.it
  organization: Dipartimento di Informatica, University of Salerno, Fisciano, Italy
– sequence: 2
  givenname: Roberto
  surname: De Prisco
  fullname: De Prisco, Roberto
  email: robdep@unisa.it
  organization: Dipartimento di Informatica, University of Salerno, Fisciano, Italy
BookMark eNpVzzFPwzAQhmEDRSKUTIws_AGXO5_rs0cUUUCq1AVYrbiJS6FKorgM_feYwsJ00vtJJz2XYtL1XSvEDcIMAfjOsZUkCZ3UrMhK49WJKHOl3I7JnIoCDaIk0u7s38ZuIgogUNKxpgtRpvQBAMgGiakQ12_b9FXvbqvxMOz7zVgP74crcR7rXWrLvzsVr4uHl-pJLlePz9X9UiZ0vJcKbRM4hmBJRc0Ns7NzajXNCYJb1w60Myq2uOamUcZQdLaGaBSFvAdNU4G_f9MwbrtNO_rQ95_JI_gfuM8MTz5D_FHpM5y-AeQ9Rhs
ContentType Book Chapter
Copyright Springer International Publishing AG 2016
Copyright_xml – notice: Springer International Publishing AG 2016
DOI 10.1007/978-3-319-47238-6_2
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783319472386
3319472380
EISSN 1611-3349
Editor Bica, Ion
Reyhanitabar, Reza
Editor_xml – sequence: 1
  givenname: Ion
  surname: Bica
  fullname: Bica, Ion
  email: ion.bica@gmail.com
– sequence: 2
  givenname: Reza
  surname: Reyhanitabar
  fullname: Reyhanitabar, Reza
  email: reza.reyhanitabar@gmail.com
EndPage 39
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s197t-218db7fbb832f47d779853e43530b9ca904962fe1c7dd2663f98a0f623b0b9b43
ISBN 9783319472379
3319472372
ISSN 0302-9743
IngestDate Wed Sep 17 03:55:01 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s197t-218db7fbb832f47d779853e43530b9ca904962fe1c7dd2663f98a0f623b0b9b43
PageCount 20
ParticipantIDs springer_books_10_1007_978_3_319_47238_6_2
PublicationCentury 2000
PublicationDate 2016
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 2016
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers
PublicationTitle Innovative Security Solutions for Information Technology and Communications
PublicationYear 2016
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Madras, Indian Institute of Technology, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatics, Saarbrücken, Germany
SSID ssj0001761373
ssj0002792
Score 1.826997
Snippet Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the...
SourceID springer
SourceType Publisher
StartPage 20
SubjectTerms Applications
Secure computation
Visual cryptography
Subtitle Models, Issues, Applications and New Directions
Title Visual Cryptography
URI http://link.springer.com/10.1007/978-3-319-47238-6_2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT8IwFG4UL8aDihp_ZwdPkpmNFsoOHgjBEILEAxBuC93axAsYmCb61_t1XbcBXvCykHWs23vde69f3_dKyIMfM99TQrpwTTOXtUTsilbEXAXfx6KAN7jUgP7rsNkbs_60MS0SMlN2SSKeop8_eSX_0SrOQa-aJbuDZvOb4gR-Q784QsM4bgS_6zBrli5o9jP9khlojnA6B7nS7MGMapRquIDQ0-WCNV5Isbe8TX0I2stoYQJM_CdvlrU32ATTYlKyF-UhN3lfaTJKZ_n9kZQrYWtZyNXzIFuuGC6SNAusZneUsAamjED4mwiERSA3MMwCRlubslJ884zXqdlCxlK3YJYxNoylk8YSN3V9RWrqmVrr6pX8tKmBtOUBykkfmqCl-2q5zRBueh-9V8hBu9sfTAocjiOg4YX31gUVzcqTeSTNB7KPXDcVm4pXyMtYmUrFGz1uLa6nMcvohBxpHoujCSYQ2CnZk_MqObYydzKZn5GqUZtTVts5Gb90R52em22V4a78gCcuArVYcCUEDLRiPOY8QBwmEQtTTwTRLMBEsFlX0o94HCMmoypozTyF2FegXTB6QSrzxVxeEsdrKNrwFI2p5AxXzHwZYU7K9cRfCsqvyKN9q1AP_lVoK19DBCENIYIwFUEIEVzvcvENOSyG1y2pJMtPeYeQLxH3mdZ-AVitTEk
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Innovative+Security+Solutions+for+Information+Technology+and+Communications&rft.au=D%E2%80%99Arco%2C+Paolo&rft.au=De+Prisco%2C+Roberto&rft.atitle=Visual+Cryptography&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319472379&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=20&rft.epage=39&rft_id=info:doi/10.1007%2F978-3-319-47238-6_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon