no code implementations • 10 Dec 2022 • Tao Yu, Jinge Ma, Guilin Li, Dongyu Yang, Rui Ma, Yishi Shi
This method can expand the application range of visual cryptography and further increase the security of visual cryptography.