scispace - formally typeset
Proceedings ArticleDOI

Halftone visual cryptography

TLDR
Halftone visual cryptography is proposed, where all shares are halftones of grey level images carrying significant visual information, and the proposed methods utilize blue-noise dithering principles to construct halftone shares having visually pleasing attributes.
Abstract
Visual cryptography encodes a secret image SI into n shares of random patterns. If the shares are xeroxed onto transparencies, we can visually decode the secret image by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, it produces random patterns which have no visual meaning, raising the suspicion of data encryption. In this paper, to achieve a higher level of security, we propose halftone visual cryptography, where all shares are halftones of grey level images carrying significant visual information. The proposed methods utilize blue-noise dithering principles to construct halftone shares having visually pleasing attributes.

read more

Citations
More filters
Proceedings ArticleDOI

Visual Cryptography Based on Void-And-Cluster Halftoning Technique

TL;DR: The proposed halftone visual cryptography using threshold arrays shows great flexibility for a combination of share images in order to decode a secret image, and achieves high quality share images, high speed processing and extensibility to (k,n) the visual cryptography of three share image categories.
Journal ArticleDOI

Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images

TL;DR: Two visual cryptographic methods are proposed to solve the problem of pixel expansion and to improve the visual effect of the stacked image at the same time and can satisfy the security and contrast conditions required by the VSS scheme.
Patent

Method of indentifying an individual

TL;DR: In this article, a method of identifying an individual in which captured images are encrypted by a transformation function and superimposed over previously recorded encrypted images is presented, where the superimposition image thus formed is used for identity verification.
Journal ArticleDOI

2D Barcodes for visual cryptography

TL;DR: This paper analyzes VC authentication methods using 2D barcodes and embed binary codes into VC shares for authentication purpose and proposes a scheme of embedding 2DBarcodes into given VC shares to prevent cheating.
Journal Article

Visual Cryptography for Digital Watermarking in Still Images

TL;DR: A novel public robust digital watermarking scheme based on visual cryptography is proposed that can be open to the public, but only the owner, who uses the private sharing image of the ownership logo, can retrieve the logo for ownership.
References
More filters

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Visual Cryptography for General Access Structures

TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.
Book ChapterDOI

Visual Authentication and Identification

TL;DR: In this article, the problem of authentication by a human recipient who does not use any trusted computational device has been studied in the context of smartcard-human interaction, in particular in the case of electronic wallets.
Journal Article

Visual authentication and identification

TL;DR: In this paper, the authors introduce visual authentication and visual identification methods, which are authentication and identification methods for human users based on visual cryptography and can be implemented using very common low-tech technology.
Proceedings ArticleDOI

Void-and-cluster method for dither array generation

TL;DR: A new method for generating homogeneous ordered dither arrays is presented, which can be used for strikingly high quality artifact-free dithering with relatively small arrays and compared with other ordered dithering and error diffusion-based techniques.