Neural Networks for
Visual Cryptography


  • Introduction

  • Experiental Results

  • Authorization --- Demo, Source

  • (2,2) access scheme --- Demo, Source

  • Halftoning and Restoration --- Demo, Source

  • General access scheme

  • Publication & References