Here is a paper by Moni Naor and Adi Shamir (appeared in EuroCrypt'94). More details plus examples will be here one day. Meanwhile you can look at these links:
A related problem is that of Visual Authentication. A paper on that subject by Benny Pinkas and Moni Naor is available here (appeared in Crypto '97).
Back to the Visual Cryptography puzzle