Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology — EUROCRYPT'94
  3. Conference paper

Visual cryptography

  • Conference paper
  • First Online: 01 January 2006
  • pp 1–12
  • Cite this conference paper
Advances in Cryptology — EUROCRYPT'94 (EUROCRYPT 1994)
Visual cryptography
  • Moni Naor1 &
  • Adi Shamir1 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 950))

Included in the following conference series:

  • Workshop on the Theory and Application of of Cryptographic Techniques
  • 20k Accesses

  • 10 Altmetric

Abstract

In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant of the k out of n secret sharing problem, in which a dealer provides a transparency to each one of the n users; any k of them can see the image by stacking their transparencies, but any k−1 of them gain no information about it.

Research supported by an Alon Fellowship.

Download to read the full chapter text

Chapter PDF

References

  1. N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of asymptotically good, low-rate error-correcting codes through pseudo-random graphs, IEEE Transactions on Information Theory, 38 (1992), 509–516.

    Article  Google Scholar 

  2. N. Alon, O. Goldreich, J. Hastad and R. Peralta, Simple constructions of almost k-wise independent random variables, Random Structures and Algorithms 3 (1992), 289–304.

    MathSciNet  Google Scholar 

  3. N. Alon and J. Spencer, The probabilistic method, Wiley, 1992.

    Google Scholar 

  4. J. L. Carter and M. N. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences 18 (1979), pp. 143–154.

    Article  MathSciNet  Google Scholar 

  5. J. Kahn, N. Linial and A. Samorodnitsky, Inclusion-exlusion: exact and approximate, manuscript.

    Google Scholar 

  6. N. Linial and N. Nisan, Approximate inclusion-exlusion, Combinatorica 10, 1990, pp. 349–365.

    Article  MathSciNet  Google Scholar 

  7. F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, North Holland, Amsterdam, 1977.

    Google Scholar 

  8. J. Naor and M. Naor, Small bias probability spaces: efficient constructions and applications, SIAM J. on Computing, vol 22, 1993, pp. 838–856.

    Article  MathSciNet  Google Scholar 

  9. M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22, pp. 265–279 (1981).

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Applied Math and Computer Science, Weizmann Institute, 76100, Rehovot, Israel

    Moni Naor & Adi Shamir

Authors
  1. Moni Naor
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Adi Shamir
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Alfredo De Santis

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naor, M., Shamir, A. (1995). Visual cryptography. In: De Santis, A. (eds) Advances in Cryptology — EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol 950. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053419

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/BFb0053419

  • Published: 23 May 2006

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60176-0

  • Online ISBN: 978-3-540-44717-7

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

52.15.91.151

Not affiliated

Springer Nature

© 2025 Springer Nature