scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A hybrid mechanism that not only aims at providing good security but at the same time has high data embedding capacity and entropy values with low execution time complexity is proposed.
Abstract: With the growing internet technology over the last decade, the number of intruders trying to steal the confidential information has also risen. As a result, for the protection of secret data from unwanted access, hybrid security mechanisms employing the use of steganography to hide the encrypted data are gaining popularity. These mechanisms provide an extra level of security to the data. This paper proposes a hybrid mechanism that not only aims at providing good security but at the same time has high data embedding capacity and entropy values with low execution time complexity. To enhance the embedding capacity of the overall system, Improved Bit Plane Complex Steganography (IBPCS) along-with Huffman coding is used and for providing randomness, the use of chaos process wherever possible is done. The cryptographic technique employed is hierarchical visual cryptography due to its efficiency over other cryptographic mechanisms. The overall scheme is implemented in MATLAB-10 and the results prove that the proposed mechanism is efficient to other available schemes in literature.

8 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: A new scheme for online fraud transaction prevention using extended visual cryptography and QR codes is proposed, which provides security for online users and detecting the phishing websites.
Abstract: Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing it is legitimate. They enter personal information on that fake website. Fraudsters collect the stolen data and login into correct website. This is an overall process of phishing. We propose a new scheme for online fraud transaction prevention using extended visual cryptography and QR codes. This scheme uses extended visual cryptography for share generation. One time password is used for phishing website detection. Extended visual cryptography is used for converting the QR code into two shares. The system provides security for online users and detecting the phishing websites.

8 citations

Proceedings ArticleDOI
25 Aug 2012
TL;DR: The paper presents a verifiable visual cryptography scheme for checking the validness to the shares engaged in a VC decoding instance, which maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image.
Abstract: The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. the idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together. the visual coherent among the revealed patterns of all pair of shares provides evidence to the genuine of the shares engaged in the decoding process. Compare to the reported cheating prevention VC schemes, the proposed scheme maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image. Besides, the proposed verification mechanism can easily be attached to any VC schemes in the literature to endow legitimate user with the ability to prevent cheating from malicious participants.

8 citations

Journal ArticleDOI
TL;DR: A new buyer-seller watermarking protocol is proposed in this paper by applying the technique of visual cryptography to Lei et al.
Abstract: Watermarking protocols are designed for tracing illegal distributors when unauthorized copies are found So far, most of the proposed schemes set up two or more watermarks embedded to a copy by the seller before it was sold The main potential concerns of multiple watermarking are the image quality would be damaged and any earlier embedded watermarks would be destroyed as well Thanks to visual cryptography which encodes the secret image into two shares, and recovers the secret by collecting these two shares Therefore, a new buyer-seller watermarking protocol is proposed in this paper by applying the technique of visual cryptography to Lei et al's scheme so as to free from the disadvantages of multiple-watermarking insertion

8 citations

Proceedings ArticleDOI
24 Mar 2011
TL;DR: This paper provides an overview of the emerging Visual Cryptography techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps.
Abstract: Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generates shadows by visual cryptography algorithms. An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party(TTP).

7 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132