Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.
9 citations
••
TL;DR: A transaction authentication solution that provides compatibility with any banking transactions and is based on a novel visual cryptographic scheme that supports multiple uses of a single static share, unlike existing techniques in the literature of visual cryptography.
9 citations
01 Jan 2012
TL;DR: An authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated.
Abstract: The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret image. Every lock-key pair has one associated unique image. The lock is just like a safe door which has a memory and that can be used to transmit and receive signals like the key. Another part of the mechanism is that the lock and the key can change the pixel distribution of the some parts of the secret image when unauthorized access is going on.
8 citations
••
01 Nov 2016
TL;DR: Effective technique of share generation based on XOR-based visual cryptography for General Access Structures is introduced and perfect restoration of the secret, no pixel expansion and no code book requirement are the advantages that the algorithm is expected to have.
Abstract: In order to share a secret information among a group of participants, the method of secret sharing is used. The secret sharing method that is used to share or encrypt images is called Visual Cryptography. The main problems that subsist in Visual Cryptography are pixel expansion and poor image quality. Research are being conducted to solve the above mentioned problems. In this research, effective technique of share generation based on XOR-based visual cryptography for General Access Structures is introduced. Perfect restoration of the secret, no pixel expansion and no code book requirement are the advantages that the algorithm is expected to have. The generated shares are then covered in an image using steganography which provides additional security.
8 citations
01 Jan 2014
TL;DR: A new VCS approach & its implementation for gray scale images based on Intensity Division is presented, in which the intensity of a pixel is divided into MSBs & LSBs and it improves the quality of shared images even after decryption of the secret image.
Abstract: Broadly speaking a term Cryptography used to secure & hide the original information of a message from the unauthorised users. First time used to encrypt a plaintext into cipher text where a key was associated at the time of encryption to change original content into some other form i.e. decrypted message. And same key was used to decrypt that message into original form. In the modern communication era, people begin to transmit huge digital and multimedia information through the public network. During the transmission, most important thing is to secure data, for which a different kind of cryptography used, known as Visual Cryptography Scheme (VCS). This paper presents a new VCS approach & its implementation for gray scale images based on Intensity Division. In this approach the intensity of a pixel is divided into MSBs & LSBs. Two shares are generated using MSBs and at the receiver’s end stacking of these provide the revealed image. It also improves the quality of shared images even after decryption of the secret image. This is finally compared with the original Host image. Performance of this approach can be measured by calculating MSE & PSNR and Histogram.
8 citations