scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.

9 citations

Journal ArticleDOI
TL;DR: A transaction authentication solution that provides compatibility with any banking transactions and is based on a novel visual cryptographic scheme that supports multiple uses of a single static share, unlike existing techniques in the literature of visual cryptography.

9 citations

01 Jan 2012
TL;DR: An authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated.
Abstract: The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret image. Every lock-key pair has one associated unique image. The lock is just like a safe door which has a memory and that can be used to transmit and receive signals like the key. Another part of the mechanism is that the lock and the key can change the pixel distribution of the some parts of the secret image when unauthorized access is going on.

8 citations

Proceedings ArticleDOI
01 Nov 2016
TL;DR: Effective technique of share generation based on XOR-based visual cryptography for General Access Structures is introduced and perfect restoration of the secret, no pixel expansion and no code book requirement are the advantages that the algorithm is expected to have.
Abstract: In order to share a secret information among a group of participants, the method of secret sharing is used. The secret sharing method that is used to share or encrypt images is called Visual Cryptography. The main problems that subsist in Visual Cryptography are pixel expansion and poor image quality. Research are being conducted to solve the above mentioned problems. In this research, effective technique of share generation based on XOR-based visual cryptography for General Access Structures is introduced. Perfect restoration of the secret, no pixel expansion and no code book requirement are the advantages that the algorithm is expected to have. The generated shares are then covered in an image using steganography which provides additional security.

8 citations

01 Jan 2014
TL;DR: A new VCS approach & its implementation for gray scale images based on Intensity Division is presented, in which the intensity of a pixel is divided into MSBs & LSBs and it improves the quality of shared images even after decryption of the secret image.
Abstract: Broadly speaking a term Cryptography used to secure & hide the original information of a message from the unauthorised users. First time used to encrypt a plaintext into cipher text where a key was associated at the time of encryption to change original content into some other form i.e. decrypted message. And same key was used to decrypt that message into original form. In the modern communication era, people begin to transmit huge digital and multimedia information through the public network. During the transmission, most important thing is to secure data, for which a different kind of cryptography used, known as Visual Cryptography Scheme (VCS). This paper presents a new VCS approach & its implementation for gray scale images based on Intensity Division. In this approach the intensity of a pixel is divided into MSBs & LSBs. Two shares are generated using MSBs and at the receiver’s end stacking of these provide the revealed image. It also improves the quality of shared images even after decryption of the secret image. This is finally compared with the original Host image. Performance of this approach can be measured by calculating MSE & PSNR and Histogram.

8 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132