scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2016
TL;DR: In this paper a proposal for replacing reversing operations with AND operations during reconstruction in perfect black VCS is shown and a comparison of the proposed modification with Cimato et al. construction is shown.
Abstract: In Visual Cryptographic Scheme (VCS) reversing operations (NOT operations) are carried out during reconstruction process to improve the quality of the reconstructed secret image. Many studies were reported on using reversing operation in both perfect and nonperfect black VCS. In 2005, Cimato et al. put forward an ideal contrast VCS with reversing, which is applicable to any access structures (IC-GA-VCS). Here there will not be any change in resolution for reconstructed secret image in comparison with original secret image (KI). In this paper a proposal for replacing reversing operations with AND operations during reconstruction in perfect black VCS is shown. A comparison of the proposed modification with Cimato et al. construction and other related work are discussed in this paper.

6 citations

Proceedings ArticleDOI
29 Mar 2018
TL;DR: The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time.
Abstract: Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time. This paper also gives a survey of the applications that are based upon the concept of Visual Cryptography.

6 citations

Book ChapterDOI
01 Aug 2017
TL;DR: A healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal fold disorders detection and embeds watermark in a secret key of identity by visual cryptography rather than audio signal.
Abstract: Health information is critical for the patient and its unauthorized access may have server impact. With the advancement in the healthcare systems especially through the Internet of Things give rises to patient privacy. We developed a healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal fold disorders detection. To avoid audio signal distortion, proposed system embeds watermark in a secret key of identity by visual cryptography rather than audio signal. The secret shares generated through visual cryptography are inserted in the secret watermark key by computing the features of audio signals. The proposed technique is evaluated using audio samples taken from voice disorder database of the Massachusetts Eye and Ear Infirmary (MEEI). Experimental results prove that the proposed technique achieves imperceptibility with reliability to extract identity, unaffected disorder detection result with high robustness. The results are provided in form of Normalized Cross-Correlation (NCR), Bit Error Rate (BER), and Energy Ratio (ENR).

6 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: A verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly and check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.
Abstract: Visual Cryptography is the same as other secret sharing schemes, which also has the problem of deception. The cheater can destroy the recovery of secret image or gain secret information by cheating through making a counterfeiter of share images. In this paper, in order to resolve the problem of deception, we proposed a verifiable visual cryptography scheme can ensure that the secret image can be visually revealed correctly. This scheme can check and verify the accuracy and truthfulness of every share image, which is simple to decrypt and without any pixel expansion.

6 citations

Journal ArticleDOI
TL;DR: Various cryptography technique and research work are represented to address the reliability problems for secret images and a visual cryptography scheme is a good alternative to remedy the vulnerabilities.
Abstract: The effective and secure protections of sensitive iare primary concerns in commercial, medi cal and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encr yption technique which is used to hide information which is present in an image. U nliketraditional cryptographic schemes, it uses hum an eyes to recover the secret without any complex decryption algorithms and the f acilitate of computers. It is a secret sharing sche me which uses images distributed as shares such that, when the shares ar e superimposed, a hidden secret image is revealed.I n this paper we represent various cryptography technique and research work do ne in this field.

6 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132