Visual Cryptography from Halftone Error Diffusion, G.R. Arce, Z. Wang, and G. Di Crescenzo Visual Secret Sharing Halftone VSS Construction Using Error Diffusion Halftone VSS Construction Using Parallel Error Diffusion Quality of Halftone Shares Discussion Simulation Results Visual Cryptography for Color Images, S. Cimato, R. De Prisco, and A. De Santis Color Superposition Formal Models for Colored VCS Schemes for the sc Model Schemes for the nd Model Schemes for the general Model Other Schemes Visual Cryptography for Multiple Secrets, S.J. Shyu Naor and Shamir's Basic Visual Secret Sharing Scheme Visual Two-Secret Sharing Schemes Visual Multiple-Secret Sharing Schemes Extended Visual Cryptography for Photograph Images, Y. Yamaguchi Basic Visual Cryptography Schemes Fundamentals of Photograph Visual Cryptography Variations of Photograph Visual Cryptography Misalignment-Tolerant Photograph Visual Cryptography Probabilistic Visual Cryptography Schemes, S. Cimato, R. De Prisco, and A. De Santis Visual Cryptography Schemes Canonical Probabilistic Schemes Probabilistic Schemes with No Pixel Expansion Trading Pixel Expansion with Probabilities Constructing Probabilistic Schemes Probabilistic Schemes with Boolean Operations Conclusions and Open Problems XOR-Based Visual Cryptography, D. Wang and L. Dong Preliminaries Visual Cryptography Scheme Using the Polarization of Light Visual Cryptography Scheme with Reversing Secret Sharing Scheme Using Boolean Operation Visual Cryptography and Random Grids, S. Jian Shyu Random Grids Visual Cryptograms of Random Grids Visual Cryptography and Contrast Bounds, A. Klein Preliminaries Approximate Inclusion Exclusion Designs and Codes Optimal 3-out-of-n Schemes Asymptotic Optimal k-out-of-n Schemes Contrast Tradeoffs for Extended Visual Cryptography Schemes Enhancing the Contrast by Nonstandard Models Visual Cryptography Schemes with Reversing, A. De Santis, A. Lisa Ferrara, and B. Masucci Visual Cryptography Schemes Almost Ideal Contrast VCS with Reversing Ideal Contrast VCS with Reversing Cheating Prevention in Visual Cryptography, Y.-C. Chen, G. Horng, and D.-S. Tsai Preliminaries Cheating Prevention Schemes Analysis of Cheating Prevention Schemes Resolving the Alignment Problem in Visual Cryptography, F. Liu Preliminaries Misalignment with Integer Number of Subpixels Misalignment with Less Than One Subpixel A Misalignment Tolerant VCS Conclusions and Discussions Acknowledgments Applications of Visual Cryptography, B. Borchert and K. Reinhardt Trojan-Secure Confirmation of Transactions Trojan-Secure Authentication Using a PIN Security Versus Multiple Use Using Refraction Technical Problems Concerning Adjustment and Parallaxes Voting with a Receipt Based on Visual Cryptography Steganography in Halftone Images, O.C. Au, Y. Guo, and J.S. Ho A Review of Error Diffusion Data Hiding by Stochastic Error Diffusion (DHSED) Data Hiding by Conjugate Error Diffusion (DHCED) Performance Analysis Image Secret Sharing, W.-Q. Yan, J. Weir, and M.S. Kankanhalli State of the Art Approaches for Image Sharing Experiment and Evaluation Polynomial-based Image Sharing, S.-J. Wang, C.-H. Yang, and Y.-T. Chen Polynomial-Based Sharing Scheme Preliminaries and Related Works Wang et al.'s Scheme Experimental Results Image Sharing with Steganography and Authentication, Z.-X. Yin, C.-C. Lin, and C.-C. Chang Related Work Adopted Techniques in the Proposed Scheme Proposed Scheme Experimental Results Two-Decoding-Option Image Sharing Method, C.-N. Yang, C.-B. Ciou, and T.-S. Chen Preliminaries Previous Works A New (k, n)-TiOISSS Experimental Results and Comparisons