scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
01 Aug 2017
TL;DR: The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique, which reduces the amount of information shared between consumer and online merchant needed for successful online transaction.
Abstract: Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer's account details and thereby increasing customer's confidence preventing "Identity theft" and "Phishing". To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

4 citations

Journal ArticleDOI
TL;DR: This paper aims to prove the better performance of the XOR Based visual cryptography schemes and traditional VCS on the basis of quality of reconstructed image and type of shares generated for colored images.
Abstract: Intent of this paper is to prove the better performance of the XOR Based visual cryptography schemes and traditional VCS on the basis of quality of reconstructed image and type of shares generated for colored images. The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares. Here we are working with (2, 2) VCS. XOR-Based visual cryptography is capable to overcome the drawbacks of the visual cryptography scheme (VCS) the small contrast of the recovered secret image.

4 citations

01 Jan 2014
TL;DR: Experiments show that the proposed scheme for user authentication using visual cryptography and digital watermarking is efficient and effective and can be implemented with minimum processing cost.
Abstract: A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.

4 citations

Proceedings ArticleDOI
06 Jul 2012
TL;DR: A natural-image-based secret image sharing scheme that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image that avoids the pixel expansion problem and makes it possible to totally recover the secret images.
Abstract: Conventional visual secret sharing (VSS) schemes generate noise-like random pixels on shares to hide secret images. However, these schemes suffer from two problems, one related to security and one related to management. First, the noise-like shares arouse suspicion, which leads to security problems for participants who are involved in a VSS scheme. Second, participants cannot visually identify each share, especially if they hold more than one share simultaneously, which leads to the management problem. To address the management problem previous researchers developed extended visual cryptography schemes that add a meaningful cover image on each share. Generally, however, these approaches introduce a more serious pixel expansion problem than conventional VSS schemes. In addition, there are still many noise-like shares, which do not effectively reduce the security problems. This paper proposes a natural-image-based secret image sharing scheme (NSISS) that can share a color secret image over n − 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In such a way, the unaltered natural images are innocuous, thus greatly reducing the security problem. Experimental results indicate that the proposed approach is an excellent solution for solving the management and security problems. Moreover, the proposed approach avoids the pixel expansion problem and makes it possible to totally recover the secret images.

4 citations

Proceedings ArticleDOI
01 Aug 2015
TL;DR: A (3, 4) image secret sharing scheme that requires less mathematical calculation than some existing techniques and does not need to make the size of the original image public is proposed.
Abstract: (k, n) image secret sharing involves sharing of a secret image into n number of pieces called shadow images in such a way that k or more number of shares can retrieve the original image. In this paper we have proposed a (3, 4) image secret sharing scheme. The proposed method has adopted the concept of visual cryptography over the 2 × 2 block. The blocks are scrambled using pseudo random sequence to hence the security level. Proposed method requires less mathematical calculation than some existing techniques and does not need to make the size of the original image public.

4 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132