scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
26 Nov 2007
TL;DR: Experimental results demonstrate the scheme to hide multiple watermarks in transparencies of visual cryptography is effective and practical and can be applied to hide some affiliated information of the secret image.
Abstract: This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained. On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations. The scheme can be applied to hide some affiliated information of the secret image. Experimental results demonstrate the scheme is effective and practical.

9 citations

01 Jan 2009
TL;DR: The proposed scheme achieves better contrast and reduces the noise in the reconstructed secret image without adding any computational complexity.
Abstract: In this paper we present visual cryptography scheme to encode a black and white image into the same size shares as the secret image. In addition, an improved method for the generation of shares is proposed using additional matrix. Visual cryptography method for encrypting printed texts, handwritten notes, and pictures are done in a perfectly secure way, and decoding these data with the human visual system. The contrast is the most important parameter in visual cryptography. Usually, the reconstructed secret image will be darker than the background of the original secret image. The proposed scheme achieves better contrast and reduces the noise in the reconstructed secret image without adding any computational complexity. In this technique the number of white pixels in the reconstructed secret image can be improve 50% or more compare to the existing method.

9 citations

Journal ArticleDOI
TL;DR: Enhanced Semantic Visual Secret Sharing Scheme is introduced that transmits a gray-scale secret image to the receiver using two color cover images and the secret image is reconstructed by digitally stacking the shares together and the result analysis shows that the ESVSS achieves security and improves the quality of the reconstructed image.
Abstract: Sharing multimedia information through the means of internet has increased many folds in this digital world. Information needs to be send across various secure channel as it contains sensitive data such as bank account details, medical reports or any financial documents. Due to the importance of information sharing, security is the most important objective that needs to be addressed while sharing this sensitive information. In order to share the information securely, one such way is visual secret sharing or visual cryptography. In this paper, introduced Enhanced Semantic Visual Secret Sharing (ESVSS) Scheme that transmits a gray-scale secret image to the receiver using two color cover images. At the receiver end, the secret image is reconstructed by digitally stacking the shares together. The result analysis shows that the ESVSS achieves security and improves the quality of the reconstructed image. The quality is measured by Peak Signal to Noise Ratio (PSNR) up to +39 dB and Mean Square Error is reduced to 6. The Universal Image Quality Index (UIQI) results are recorded up to 90% for the reconstructed image with minimal computational complexity.

9 citations

Proceedings ArticleDOI
13 May 2008
TL;DR: A novel approach for detection of cheating in visual cryptography based on steganography for hiding digital signature of the secret image is proposed, which hides the verification bits of the signature in the different shares of the participants.
Abstract: A novel approach for detection of cheating in visual cryptography based on steganography for hiding digital signature of the secret image is proposed. The proposed technique hides the verification bits of the signature in the different shares of the participants. For hiding binary "0", no flipping of the subpixel is done in the block of the share, but change is done for hiding binary "1" by flipping a white (black) subpixel in one of the blocks of black (white) share The hidden signature can be recovered in the presence of all shares and verified by comparing with the reconstructed digital signature in case of doubt.

9 citations

01 Jan 2013
TL;DR: This work has proposed a cryptographic technique for color images where they are using color error diffusion with XOR operation and this approach produces less distorted image and the size of the decrypted images is same as the original image.
Abstract: Visual Cryptography is a special technique which is used to send the images securely over the network. Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Simple Visual Cryptographic technique is insecure. This cryptographic technique involves dividing the secret image into n shares and a certain number of shares (m) are sent over the network. The decryption process involves stacking of the shares to get the secret image. In the current work, we have proposed a cryptographic technique for color images where we are using color error diffusion with XOR operation. The shares are developed using Random number. The key generated for decryption process is sent securely over the network using RSA algorithm. This approach produces less distorted image and the size of the decrypted images is same as the original image.

9 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132