scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR, a secured model in communicating sensitive (biometric features) information over the internet.
Abstract: With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.

5 citations

Book ChapterDOI
Divya James1, Mintu Philip1
09 Aug 2012
TL;DR: New security architecture for biometric templates using visual cryptography and chaotic image encryption is proposed, which ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption.
Abstract: Protection of biometric data and templatesis a crucial issue for the security of biometric systems This paper proposes new security architecture for biometric templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing the original image into two images (known as sheets) such that the original image can be revealed only when both images are simultaneously available; the individual sheet images do not reveal the identity of the original image. The algorithm ensures protection as well as privacy for image using a fast encryption algorithm based on chaotic encryption. Chaos based cryptography is applied on to individual shares. Using this one can cross verify his identity along with the protection and privacy of the image.

5 citations

Proceedings ArticleDOI
26 Nov 2008
TL;DR: The experimental results show that the proposed digital watermarking scheme can withstand common image processing attacks, namely; noise adding, JPEG compression and cropping attack.
Abstract: Watermarking techniques are primarily used to hide information and for copyright protection. In this paper, we propose a digital watermarking scheme, which is based on visual cryptography and image processing techniques. One advantage of visual cryptography is its capability to exploit the human eyes to decrypt secret images without requiring any computation. The property of visual sharing scheme is introduced to improve the security of conventional watermarking. The experimental results show that the proposed method can withstand common image processing attacks, namely; noise adding, JPEG compression and cropping attack.

5 citations

Journal Article
TL;DR: A new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption and extra protection as well as privacy is ensured for these images.
Abstract: Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using chaotic encryption extra protection as well as privacy is ensured for these images. Chaotic encryption is applied onto each share. Any system having chaotic behaviour is used for getting values for encrypting the shares. Here 1D logistic map is used.

5 citations

Book ChapterDOI
23 Aug 2017
TL;DR: A novel (t, s, k, n) essential and non-essential visual cryptography scheme (ENVCS) with different importance of participants is proposed by concatenating the basis matrices of these smaller schemes.
Abstract: Traditional (k, n) visual cryptography scheme (VCS) encrypts a secret image into n shadows. Any k or more shadows can be printed on transparences and stacked together to reveal the secret image, while any k−1 or less shadows cannot get any information about the secret image. Most of the previous VCSs do not distinguish the importance of shadows. In this paper, we propose a novel (t, s, k, n) essential and non-essential visual cryptography scheme (ENVCS) with different importance of participants. According to the concept of constructing VCS from smaller schemes, we construct the basis matrices for (t, s, k, n)-ENVCS by concatenating the basis matrices of these smaller schemes. The constructed (t, s, k, n)-ENVCS is also progressive VCS. Experiments and analyses are conducted to verify the security and efficiency of the proposed method.

5 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132