Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Jan 2014TL;DR: Two visual cryptography schemes which simulated the principle of fountains are proposed which are more general and simpler, real flexible and has competitive visual quality for the recovered secret image.
Abstract: For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered secret image will be distorted. Sometimes, m is too large that will bring much inconvenience to the participants to carry the share images. In this paper, we propose two visual cryptography schemes which simulated the principle of fountains. The proposed schemes have two advantages: non-distortion and flexible (with respect to the pixel expansion). Furthermore, the proposed schemes can be applied to any VCS that is under the pixel by pixel encryption model, such as VCS for general access structure, color VCS and extended VCS, and our VCS does not restrict to any specific underlying operation. Compared with other non-distortion schemes, the proposed schemes are more general and simpler, real flexible and has competitive visual quality for the recovered secret image.
7 citations
••
01 Jan 2016TL;DR: Experimental results show that the proposed watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition is imperceptible, secure and robust to the common image processing and other attacks.
Abstract: Imperceptibility, robustness and security are the most important parameters of a watermarking scheme and tradeoff between these parameters is a challenging task. In this paper, we propose a watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition (SVD). Watermark image is encoded into n shares using visual cryptography of shares scheme. Among the n shares any two shares belonging to qualified set of shares are chosen and embedded into U and V component of SVD. The unused shares are with the authorized owner which can be used to extract the whole watermark. This can be done by superimposing shares or bitwise logical AND operation with the binary shares extracted from U and V component of watermarked image. Moreover the U and V component of SVD are exploited to enhance the imperceptibility. Experimental results show that the proposed technique is imperceptible, secure and robust to the common image processing and other attacks.
7 citations
01 Jan 2014
TL;DR: This paper presents an extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images with Ring Shares and a novel Perceptual Secret Sharing Scheme.
Abstract: ESSVCS: An Enriched Secret Sharing Visual Cryptography.- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images.- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares.- Password Protected Visual Cryptography via Cellular Automaton Rule 30.- A Novel Perceptual Secret Sharing Scheme.- Visual Cryptography Based Watermarking.- Flexible Visual Cryptography Scheme and Its Application.
7 citations