scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
23 May 2019
TL;DR: A double authentication system where user is identified by decrypted image and PSNR value is proposed, which provides a very high level of security.
Abstract: Authentication is a critical step in initializing a bank transaction. Core banking and net banking systems use ID cards, passwords/PIN, OTP, etc. for authentication. However, these methods are still prone to forgery and hacking, due to which unauthorized person could gain access to user’s account. We propose a methodology which uses an image share as authentication key. This has been created using visual cryptography and other image processing techniques to encrypt authentication parameters. It is encrypted such that the share becomes incomprehensible to human eyes and non-decryptable by hacker, thus protecting the data from forgery or hacking. This paper proposes a double authentication system where user is identified by decrypted image and PSNR value. Hence this system provides a very high level of security.

7 citations

Proceedings ArticleDOI
01 Nov 2016
TL;DR: Hierarchical Visual Cryptography Scheme is applied on gray image instead of binary image, so, generated shares are gray share, not binary shares that are generated by the binary image.
Abstract: In this technology era, every sensitive data must be secured. Visual cryptography is a technique to hide the image based secret. In visual cryptography the secret image is encrypted in to shares and at decryption side all shares are superimposed with each other so that secret is revealed. The key feature of visual cryptography is that, no difficult computation is needed at decryption side to decrypt the secret. In this paper we are applying Hierarchical Visual Cryptography Scheme on gray image instead of binary image. So, generated shares are gray share, not binary shares that are generated by the binary image. Here we are using the new proposed gray share generation algorithm for generation of n number of shares. Here original image is encrypted in to n number of levels so security of original image is increased. At decryption side all n shares must have to participate to reveal the original secret. Decrypted image has same size and better visual quality then original secret image.

7 citations

Book ChapterDOI
01 Jan 2020
TL;DR: The proposed architecture provides revocability to multimodal biometric templates and secures their storage and transmission over a remote network with the help of visual cryptography technique.
Abstract: This work proposes an architecture for multimodal biometric recognition systems where user, recognition system, and template database are remotely located over a network. As the number of biometrics are limited and once lost they are compromised forever, it becomes imperative to design systems that optimize recognition rates and also address security and privacy issues for biometric-enabled authentication schemes. The proposed architecture provides revocability to multimodal biometric templates and secures their storage and transmission over a remote network with the help of visual cryptography technique. The proposed architecture gives a good matching performance and also fulfills four template protection criteria, i.e., security, diversity, revocability, and performance. Various attack scenarios such as phishing, replay, database, man-in-middle, and attack via record multiplicity are also addressed.

7 citations

Proceedings ArticleDOI
18 Nov 2014
TL;DR: An encryption technique of securing the biometric image data collected from devices with an approach of feature based encryption technique based on a visual cryptographic technique is proposed.
Abstract: With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computers etc, there is a need for securing the image templates obtained from crime scenes as well as such devices before storing them in locations such as the cloud etc. In this paper, we proposed an encryption technique of securing the biometric image data collected from devices with an approach of feature based encryption technique. The biometric image data was encrypted using advanced encryption process and visual cryptography method. The method engaged the encrypted feature extracted from the plain image in the encryption process and used in to encrypt the image based on a visual cryptographic technique. Analysis of the plain and ciphered image was done and there was no pixel expansion in the process. The implementation was done using MATLAB.

7 citations

Book ChapterDOI
07 May 2007
TL;DR: A new construction of visual cryptography scheme with dihedral group access structure for two shares and many secret images is proposed, which is perfect and has contrast 1/(6n2).
Abstract: A new construction of visual cryptography scheme (VCS) with dihedral group access structure for two shares and many secret images is proposed Let D2n be a dihedral group of order 2n, and let {Image(τ) | τ ∈ D2n} be 2n secret images corresponding to D2n In a VCS with dihedral group access structure, two shares (two transparencies) A and B are constructed so that for any element τ of D2n, A and τ (B) reconstruct the secret image Image(τ) This new VCS is perfect and has contrast 1/(6n2)

7 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132