scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Visual Cryptography is a cryptographic method which takes less amount of time to encrypt or decrypt data and can be applied in the field of cloud to improve its security parameters.
Abstract: Cloud computing is growing day-by-day in the current world scenario. Organizations are excited and worried at the same time to use cloud computing features as it will require for them to move their data on public cloud. Resource utilization is the main advantage of cloud computing which results in storing data of multiple clients in one place. Private cloud is preferred by the companies but it does not provide all the advantages of cloud computing. Cloud providers are working hard to secure their infrastructure and the stored data in cloud. To secure data, encryption is the most preferred solution. But the problem with traditional cryptographic methods is that they take huge amount of computation power and time in processing the encrypted data. Visual Cryptography is a cryptographic method which takes less amount of time to encrypt or decrypt data and can be applied in the field of cloud to improve its security parameters. It can also be used in the financial field such as Cheque Truncation System to transfer the images securely. General Terms Security, Cryptography, Steganography et. al.

6 citations

Journal ArticleDOI
TL;DR: A simple scheme is proposed to conquer the cheating problem by facilitating the capability of share authentication and effectively addresses the two main problems of VC, i.e., the inconvenience of meaningless share management and the challenge of achieving difficult alignment.
Abstract: Visual Cryptography (VC) has drawn much attention for providing the service of secret communication. Basically, VC is the process of encoding a secret into several meaningless shares and later decoding the secret by superimposing all or some of the shares without any computation involved. VC has been adopted to support some practical applications, such as image authentication, visual authentication, image hiding, and digital watermarking. Unfortunately, in many applications, VC has been shown to suffer from the "cheating problem" in which the disclosed secret image may be altered by malicious insiders who are called "cheaters." While ubiquitous computing has been well developed, it has recently occurred to people in both academia and industry that research could benefit more from computational VC by introducing light-weight computation costs in the decoding phase. In this paper, a simple scheme is proposed to conquer the cheating problem by facilitating the capability of share authentication. It is worthwhile to note that the proposed scheme can identify for certain whether cheating attacks have occurred or not, while other schemes that have the same objective frequently provide a vague answer. In addition, the proposed scheme effectively addresses the two main problems of VC, i.e., the inconvenience of meaningless share management and the challenge of achieving difficult alignment.

6 citations

01 Jan 2010
TL;DR: It’s time to dust off the graphy and start thinking about the practicalities.
Abstract: Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the cryptography knowledge or complex computations. Furthermore, seeing to the freeness of the secret key, the whole process of encryption as well as decryption for the visual cryptography meets a fast dealing course. As to the security concern, it is able to guarantee that no one can have access to any clues about the content of a secret image from individual cover images. Thus, owing to the studies on this area, the target of light-weighted cryptography is reached. Now the visual cryptography has been developed from the meaningless shadows to the meaningful ones. Seeing to the highly developed technique, some advanced VC techniques are introduced in this survey, respectively.

6 citations

Journal ArticleDOI
TL;DR: The experimental results show that the proposed algorithm is effective and robust against attacks such as JPEG compression, add noise, multiple filters, scale, little angle rotation and crop, especial print-scan attacks.
Abstract: This paper proposes a zero-watermark scheme for identification photos based on QR code and visual cryptography. The method makes no changes to original images while embedding the QR code watermark. In order to ensure the security, we use Arnold transformation to scrambling the watermark. In the scheme, we use discrete wavelet transform and matrix norm computing to generate the invariant feature values against print-scan attacks. Then the VC scheme is applied to generate the secret image from the feature values and the disturbed watermark by using a codebook. In the extraction scheme, we get the secret image which is registered to certification authority and the feature values extracted from the examined image with VC scheme, and then apply inverse Arnold transformation to restore the watermark, finally repair position patterns of the QR code. The experimental results show that the proposed algorithm is effective and robust against attacks such as JPEG compression, add noise, multiple filters, scale, little angle rotation and crop, especial print-scan attacks.

5 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This paper proposed a new method for active digital image forensics based on visual cryptographic schemes which provide improved authenticity, confidentiality, integrity, and robustness and discussed the demerits of the existing model.
Abstract: Digital image forensics is an emerging research area which focuses on validating the authenticity, integrity of images, and detection of image forgeries. Digital image watermarking and digital signatures are presently used in active digital image forensics, but these methods provide only the authenticity and certain level of integrity and robustness. In this paper, we proposed a new method for active digital image forensics based on visual cryptographic schemes which provide improved authenticity, confidentiality, integrity, and robustness. Here, we have presented an overview of active digital image forensics and visual cryptographic schemes which have been discussed based on several studies. We have also discussed the demerits of the existing model and proposed a new model for image authentication and tampering detection. The proposed method is demonstrated with a simple example.

5 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132