scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This work has developed a high-chroma color visual encryption technique using the interference color of high-order retarder films, and proposes a stacking technique for displaying high- chroma interference color images.
Abstract: Visual cryptography can be used as a method of sharing a secret image through several encrypted images. Conventional visual cryptography can display only monochrome images. We have developed a high-chroma color visual encryption technique using the interference color of high-order retarder films. The encrypted films are composed of a polarizing film and retarder films. The retarder films exhibit interference color when they are sandwiched between two polarizing films. We propose a stacking technique for displaying high-chroma interference color images. A prototype visual cryptography device using high-chroma interference color is developed.

4 citations

Proceedings ArticleDOI
01 Nov 2017
TL;DR: The results show that by applying the Wang's schemes in YCbCr can minimize the computation without loss of quality.
Abstract: Visual cryptography schemes for color images usually is performed by expanding every pixel in the secret image into some subpixels in the shared images. Wang's schemes are secret image schemes based on XOR operation without expansion of the pixels so that size of shared images are equal to size of the secret images. The schemes are applied to RGB images. In this paper, a method to perform the schemes with minimal computation is proposed. The secret images in RGB color is transformed to YCbCr color model, and computation is performed only on Y component. The comparison of computation between RGB and YCbCr has been done. The results show that by applying the Wang's schemes in YCbCr can minimize the computation without loss of quality.

4 citations

01 Jan 2012
TL;DR: Compared with the traditional VCS, the proposed scheme can hide more information of the grayscale secret image, and has smaller size expansion without deteriorating the visual quality of the revealed image of VCS.
Abstract: From the point of view of information hiding,traditional visual cryptography scheme(VCS) is not an efficient method.It can only share a small sized secret image due to the large pixel expansion.A(t,k,n) multi-threshold image secret sharing scheme is proposed to increase the amount of hidden information.A grayscale secret image is hidden in a VCS to guide the choice of share matrices.In the first phase of the reconstruction process,any t participants can stack their shadow images to decode a vague secret image by human visual system.In the second phase,any k participants can extract additional information hidden in their shadow images,and reveal a precise grayscale secret image by computation.Compared with the traditional VCS,the proposed scheme can hide more information of the grayscale secret image,and has smaller size expansion without deteriorating the visual quality of the revealed image of VCS.

4 citations

Ching-Nung, Yang, Chih-Cheng, Wu, Feng, Liu 
01 Jan 2011
TL;DR: In this paper, another construction of (k, n)-PVCS was proposed by extending the (n, k)-DVCS and the probabilistic VCS.
Abstract: Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistic VCS (PVCS) For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS

4 citations

Journal ArticleDOI
TL;DR: In this paper comparison of the paper with the existing system is done and how the method is more efficient is shown and also results are shown.
Abstract: Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results. General Terms Visual cryptography, Grayscale, Threshold algorithm.

4 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132