scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2014
TL;DR: Two visual cryptography schemes which simulated the principle of fountains are proposed which are more general and simpler, real flexible and has competitive visual quality for the recovered secret image.
Abstract: For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered secret image will be distorted. Sometimes, m is too large that will bring much inconvenience to the participants to carry the share images. In this paper, we propose two visual cryptography schemes which simulated the principle of fountains. The proposed schemes have two advantages: non-distortion and flexible (with respect to the pixel expansion). Furthermore, the proposed schemes can be applied to any VCS that is under the pixel by pixel encryption model, such as VCS for general access structure, color VCS and extended VCS, and our VCS does not restrict to any specific underlying operation. Compared with other non-distortion schemes, the proposed schemes are more general and simpler, real flexible and has competitive visual quality for the recovered secret image.

7 citations

Book ChapterDOI
01 Jan 2016
TL;DR: Experimental results show that the proposed watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition is imperceptible, secure and robust to the common image processing and other attacks.
Abstract: Imperceptibility, robustness and security are the most important parameters of a watermarking scheme and tradeoff between these parameters is a challenging task. In this paper, we propose a watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition (SVD). Watermark image is encoded into n shares using visual cryptography of shares scheme. Among the n shares any two shares belonging to qualified set of shares are chosen and embedded into U and V component of SVD. The unused shares are with the authorized owner which can be used to extract the whole watermark. This can be done by superimposing shares or bitwise logical AND operation with the binary shares extracted from U and V component of watermarked image. Moreover the U and V component of SVD are exploited to enhance the imperceptibility. Experimental results show that the proposed technique is imperceptible, secure and robust to the common image processing and other attacks.

7 citations

WANGDaoshun, LUOPing, YANGLu, QIDongxu, DAIYiqi 
01 Jan 2003

7 citations

01 Jan 2014
TL;DR: This paper presents an extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images with Ring Shares and a novel Perceptual Secret Sharing Scheme.
Abstract: ESSVCS: An Enriched Secret Sharing Visual Cryptography.- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images.- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares.- Password Protected Visual Cryptography via Cellular Automaton Rule 30.- A Novel Perceptual Secret Sharing Scheme.- Visual Cryptography Based Watermarking.- Flexible Visual Cryptography Scheme and Its Application.

7 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132