Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Jan 2016TL;DR: In this paper a proposal for replacing reversing operations with AND operations during reconstruction in perfect black VCS is shown and a comparison of the proposed modification with Cimato et al. construction is shown.
Abstract: In Visual Cryptographic Scheme (VCS) reversing operations (NOT operations) are carried out during reconstruction process to improve the quality of the reconstructed secret image. Many studies were reported on using reversing operation in both perfect and nonperfect black VCS. In 2005, Cimato et al. put forward an ideal contrast VCS with reversing, which is applicable to any access structures (IC-GA-VCS). Here there will not be any change in resolution for reconstructed secret image in comparison with original secret image (KI). In this paper a proposal for replacing reversing operations with AND operations during reconstruction in perfect black VCS is shown. A comparison of the proposed modification with Cimato et al. construction and other related work are discussed in this paper.
6 citations
••
29 Mar 2018TL;DR: The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time.
Abstract: Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time. This paper also gives a survey of the applications that are based upon the concept of Visual Cryptography.
6 citations
••
01 Aug 2017TL;DR: A healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal fold disorders detection and embeds watermark in a secret key of identity by visual cryptography rather than audio signal.
Abstract: Health information is critical for the patient and its unauthorized access may have server impact. With the advancement in the healthcare systems especially through the Internet of Things give rises to patient privacy. We developed a healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal fold disorders detection. To avoid audio signal distortion, proposed system embeds watermark in a secret key of identity by visual cryptography rather than audio signal. The secret shares generated through visual cryptography are inserted in the secret watermark key by computing the features of audio signals. The proposed technique is evaluated using audio samples taken from voice disorder database of the Massachusetts Eye and Ear Infirmary (MEEI). Experimental results prove that the proposed technique achieves imperceptibility with reliability to extract identity, unaffected disorder detection result with high robustness. The results are provided in form of Normalized Cross-Correlation (NCR), Bit Error Rate (BER), and Energy Ratio (ENR).
6 citations
••
01 Nov 2012TL;DR: A verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly and check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.
Abstract: Visual Cryptography is the same as other secret sharing schemes, which also has the problem of deception. The cheater can destroy the recovery of secret image or gain secret information by cheating through making a counterfeiter of share images. In this paper, in order to resolve the problem of deception, we proposed a verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly. This scheme can check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.
6 citations
••
TL;DR: Various cryptography technique and research work are represented to address the reliability problems for secret images and a visual cryptography scheme is a good alternative to remedy the vulnerabilities.
Abstract: The effective and secure protections of sensitive iare primary concerns in commercial, medi cal and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encr yption technique which is used to hide information which is present in an image. U nliketraditional cryptographic schemes, it uses hum an eyes to recover the secret without any complex decryption algorithms and the f acilitate of computers. It is a secret sharing sche me which uses images distributed as shares such that, when the shares ar e superimposed, a hidden secret image is revealed.I n this paper we represent various cryptography technique and research work do ne in this field.
6 citations