scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
01 Jan 2014
TL;DR: A new approach named as "Malicious Website Detection using Visual Cryptography and OTP" to solve the problem of phishing is proposed with the combination of OTP (One Time Password).
Abstract: With the advent of internet, various online attacks have been increased and among them, the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit information from unsuspecting victims for identity theft, financial gain and other fraudulent activities, by pretending to be a trustworthy entity. Victims are tricked into providing such information by a combination of spoofing techniques and social engineering. Fake websites which appear very similar to the original ones are being hosted to achieve this. In this paper we have proposed a new approach named as "Malicious Website Detection using Visual Cryptography and OTP" to solve the problem of phishing. Here an image based authentication using Visual Cryptography is implemented with the combination of OTP (One Time Password). The use of visual cryptography is explored to preserve the privacy of an image captcha by decomposing the original image captcha into two shares. The original image is obtained at the user end only when both the user and the server under test are registered with the trusted server. Using this, website cross verifies its identity and proves that it is a genuine website before the end users.

4 citations

Book ChapterDOI
01 Jan 2007
TL;DR: The paper contains proposal of some modification of the secure signature creation and verification protocol based on the visual cryptography methods allowing the human to verify the authenticity of the data being signed or signed, without any knowledge of cryptography, cryptographic computations, or computational devices.
Abstract: The trusted presentation of the signed or being signed data is one of the key problem, which should be solved in so called secure signature creation and verification devices. Such presentation (in literature respectively known as a What You See Is What You Sign (WYSIWYS) and What You See Was Signed (WYSWS) problems) is the crucial issue especially in distributed environment. The trust assigned to various elements of such environment is limited so the participation of the commonly accepted Trusted Party (TP) operating on-line is the solution of that problem [1, 2]. The paper contains proposal of some modification of the secure signature creation and verification protocol, which was presented by W. Chocianowicz, et al. [1, 2]. The modification is made in the part related to the trusted presentation of the data, which should be signed by the signer or validated by the verifier. The modification is based on the visual cryptography methods allowing the human to verify the authenticity of the data being signed or signed, without any knowledge of cryptography, cryptographic computations, or computational devices.

4 citations

Book ChapterDOI
16 Jun 2019
TL;DR: This paper tries to find a reasonable compromise between the randomness of shares and the quality of the secret reconstruction of a Naor-Shamir visual cryptography scheme.
Abstract: Standard Naor-Shamir visual cryptography scheme is modified in a way that allows sampling from all possible 16 two-by-two tiles for generating shares. Such a procedure makes shares not only looking random but simply being random in the statistical sense. Of course there is a price to pay in the form of slightly deteriorated quality of the reconstructed secret. In this paper we try to find a reasonable compromise between the randomness of shares and the quality of the secret reconstruction.

4 citations

Book ChapterDOI
16 Jan 2018
TL;DR: A vision based system to find encrypted targets in unknown environments by using small-scale robots and visual cryptography to encrypt data and show the effectiveness of the proposed method.
Abstract: The last few years have seen a growing use of robots to replace humans in dangerous activities, such as inspections, border control, and military operations. In some application areas, as the latter, there is the need to hide strategic information, such as acquired data or relevant positions. This paper presents a vision based system to find encrypted targets in unknown environments by using small-scale robots and visual cryptography. The robots acquire a scene by a standard RGB camera and use a visual cryptography based technique to encrypt the data. The latter is subsequently sent to a server whose purpose is to decrypt and analyse it for searching target objects or tactic positions. To show the effectiveness of the proposed system, the experiments were performed by using two robots, i.e., a small-scale rover in indoor environments and a small-scale Unmanned Aerial Vehicle (UAV) in outdoor environments. Since the current literature does not contain other approaches comparable with that we propose, the obtained remarkable results and the proposed method can be considered as baseline in the area of encrypted target search by small-scale robots.

4 citations

Journal ArticleDOI
TL;DR: The experimental results show that the proposed fingerprint watermarking scheme over natural image based on visual cryptography for identification and authentication is robust against various water marking attacks.
Abstract: Protection of biometric data is gaining interest and hence digital watermarking techniques are one of the best ways to protect biometric data from accidental or intentional attacks. We have proposed fingerprint watermarking scheme over natural image based on visual cryptography for identification and authentication. The scheme does not embed the fingerprint directly onto the natural image instead using the concept of visual cryptography fingerprint is divided into parts called as shares. The verification share is generated at the time of fingerprint embedding process and while performing identification and authentication master share is generated. Fingerprint is extracted using these two shares. Correlation value between original fingerprint and extracted fingerprint is the deciding factor for identification and authentication. The experimental results show that the scheme is robust against various watermarking attacks.

4 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132