Visual Cryptography Models, Issues, Applications and New Directions
Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives.
Saved in:
| Published in | Innovative Security Solutions for Information Technology and Communications pp. 20 - 39 |
|---|---|
| Main Authors | , |
| Format | Book Chapter |
| Language | English |
| Published |
Cham
Springer International Publishing
2016
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783319472379 3319472372 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-319-47238-6_2 |
Cover
| Abstract | Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives. |
|---|---|
| AbstractList | Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospectives. |
| Author | De Prisco, Roberto D’Arco, Paolo |
| Author_xml | – sequence: 1 givenname: Paolo surname: D’Arco fullname: D’Arco, Paolo email: pdarco@unisa.it organization: Dipartimento di Informatica, University of Salerno, Fisciano, Italy – sequence: 2 givenname: Roberto surname: De Prisco fullname: De Prisco, Roberto email: robdep@unisa.it organization: Dipartimento di Informatica, University of Salerno, Fisciano, Italy |
| BookMark | eNpVzzFPwzAQhmEDRSKUTIws_AGXO5_rs0cUUUCq1AVYrbiJS6FKorgM_feYwsJ00vtJJz2XYtL1XSvEDcIMAfjOsZUkCZ3UrMhK49WJKHOl3I7JnIoCDaIk0u7s38ZuIgogUNKxpgtRpvQBAMgGiakQ12_b9FXvbqvxMOz7zVgP74crcR7rXWrLvzsVr4uHl-pJLlePz9X9UiZ0vJcKbRM4hmBJRc0Ns7NzajXNCYJb1w60Myq2uOamUcZQdLaGaBSFvAdNU4G_f9MwbrtNO_rQ95_JI_gfuM8MTz5D_FHpM5y-AeQ9Rhs |
| ContentType | Book Chapter |
| Copyright | Springer International Publishing AG 2016 |
| Copyright_xml | – notice: Springer International Publishing AG 2016 |
| DOI | 10.1007/978-3-319-47238-6_2 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783319472386 3319472380 |
| EISSN | 1611-3349 |
| Editor | Bica, Ion Reyhanitabar, Reza |
| Editor_xml | – sequence: 1 givenname: Ion surname: Bica fullname: Bica, Ion email: ion.bica@gmail.com – sequence: 2 givenname: Reza surname: Reyhanitabar fullname: Reyhanitabar, Reza email: reza.reyhanitabar@gmail.com |
| EndPage | 39 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-s197t-218db7fbb832f47d779853e43530b9ca904962fe1c7dd2663f98a0f623b0b9b43 |
| ISBN | 9783319472379 3319472372 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:55:01 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-s197t-218db7fbb832f47d779853e43530b9ca904962fe1c7dd2663f98a0f623b0b9b43 |
| PageCount | 20 |
| ParticipantIDs | springer_books_10_1007_978_3_319_47238_6_2 |
| PublicationCentury | 2000 |
| PublicationDate | 2016 |
| PublicationDateYYYYMMDD | 2016-01-01 |
| PublicationDate_xml | – year: 2016 text: 2016 |
| PublicationDecade | 2010 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham |
| PublicationSeriesSubtitle | Security and Cryptology |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | Lect.Notes Computer |
| PublicationSubtitle | 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers |
| PublicationTitle | Innovative Security Solutions for Information Technology and Communications |
| PublicationYear | 2016 |
| Publisher | Springer International Publishing |
| Publisher_xml | – name: Springer International Publishing |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Madras, Indian Institute of Technology, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany |
| SSID | ssj0001761373 ssj0002792 |
| Score | 1.826997 |
| Snippet | Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the... |
| SourceID | springer |
| SourceType | Publisher |
| StartPage | 20 |
| SubjectTerms | Applications Secure computation Visual cryptography |
| Subtitle | Models, Issues, Applications and New Directions |
| Title | Visual Cryptography |
| URI | http://link.springer.com/10.1007/978-3-319-47238-6_2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT8IwFG4UL8aDihp_ZwdPkpmNFsoOHgjBEILEAxBuC93axAsYmCb61_t1XbcBXvCykHWs23vde69f3_dKyIMfM99TQrpwTTOXtUTsilbEXAXfx6KAN7jUgP7rsNkbs_60MS0SMlN2SSKeop8_eSX_0SrOQa-aJbuDZvOb4gR-Q784QsM4bgS_6zBrli5o9jP9khlojnA6B7nS7MGMapRquIDQ0-WCNV5Isbe8TX0I2stoYQJM_CdvlrU32ATTYlKyF-UhN3lfaTJKZ_n9kZQrYWtZyNXzIFuuGC6SNAusZneUsAamjED4mwiERSA3MMwCRlubslJ884zXqdlCxlK3YJYxNoylk8YSN3V9RWrqmVrr6pX8tKmBtOUBykkfmqCl-2q5zRBueh-9V8hBu9sfTAocjiOg4YX31gUVzcqTeSTNB7KPXDcVm4pXyMtYmUrFGz1uLa6nMcvohBxpHoujCSYQ2CnZk_MqObYydzKZn5GqUZtTVts5Gb90R52em22V4a78gCcuArVYcCUEDLRiPOY8QBwmEQtTTwTRLMBEsFlX0o94HCMmoypozTyF2FegXTB6QSrzxVxeEsdrKNrwFI2p5AxXzHwZYU7K9cRfCsqvyKN9q1AP_lVoK19DBCENIYIwFUEIEVzvcvENOSyG1y2pJMtPeYeQLxH3mdZ-AVitTEk |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Innovative+Security+Solutions+for+Information+Technology+and+Communications&rft.au=D%E2%80%99Arco%2C+Paolo&rft.au=De+Prisco%2C+Roberto&rft.atitle=Visual+Cryptography&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319472379&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=20&rft.epage=39&rft_id=info:doi/10.1007%2F978-3-319-47238-6_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |