scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2020
TL;DR: An online voting system for Maharashtra Carrom Association where members can cast their vote with their computers, and laptops, and to maintain the security the method is using CAPTCHA code and Image Share technology.
Abstract: The main aim of using visual cryptography in voting system is to give provision for casting vote for internal decisions in an organization. It is flexible enough to cast vote from remote places. Election is a total confidential process and is held with maximum secrecy. Hence, we have proposed an online voting system for Maharashtra Carrom Association where members can cast their vote with their computers, and laptops. To maintain the security we are using CAPTCHA code and Image Share technology. The proposed method offers anonymity of voter identity, while keeping the votes private, and the election transparent and secure.

4 citations

Book ChapterDOI
01 Jan 2020
TL;DR: This chapter aims to help the readers to get familiar with the classical VC algorithms, including the classical deterministic VC with pixel expansion as developed in Naor and Shamir’s seminal work.
Abstract: This chapter aims to help the readers to get familiar with the classical VC algorithms. These algorithms are also stepstones for developing more complicated algorithms in later chapters. First, we introduce the general framework of VC, such as access structure and general requirements (security and contrast). Then, we introduce the classical deterministic VC with pixel expansion as developed in Naor and Shamir’s seminal work. Next, the size-invariant algorithms are summarized, including the probabilistic VC and random grid VC. Some examples will be discussed for the readers that are new to this topic. Finally, various security levels in visual cryptography will be discussed, including strong security and several weak securities.

4 citations

01 Jan 2015
TL;DR: This work describes the concept of data hiding using visual cryptography, a data hiding technique to embed a secret message along with the secret image in a multiple number of frames using asymmetric cryptographic technique.
Abstract: Now days the secured data transmission and data integrity are the two challenging areas for research. This work describes the concept of data hiding using visual cryptography. Encrypted video is split into audio, video and frames using FFMPEG tool. Then randomly two frames are selected to hide secured message and image for converting this image to a grey scale and from grey scale to binary images for splitting into two shares using visual cryptography scheme. To hide steganography technique the cipher text is embedded into the two shares. Then by using invisible watermarking technique hide those two shares into the selected frames and the image is hided and finally all the frames are again converted into video using the FFMPEG tool and video is encrypted using the base64 encoder with asymmetric cryptographic technique .In the receiver system, the video was decrypted and split into frames and extracting the shares and data by selecting the frames which was watermarked. In the recent years, with the development of computer technology and Internet technology, multimedia data are used more and more widely, such as images, videos or audios. In order to keep secure, some sensitive videos need to be protected before transmission. For this data hiding technique is used along with visual cryptography. Data hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The advantage of steganography over cryptography is the practice of protecting the contents of a message alone, while steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.In this paper, we propose a data hiding technique to embed a secret message along with the secret image in a multiple number of frames. Here encoding and decoding is done with the help of asymmetric cryptography technique along with the base64 encoder. Base64 is commonly used in a number of applications, including email via MIME, and storing complex data in XML.

4 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images that allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.
Abstract: This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images. Many of the existing digital watermarking techniques use a method which does not involve embedding of the watermark into the vulnerable images, but rather it only uses the features of image as the security key for generating watermark. This is assisted with the visual cryptography which makes it possible to perform watermarking without embedding any data onto it. Although they perform very well with many different attacks like scaling, rotating, compression, different kind of noises, etc., it still fails to prove the copyrights of image when the attack as illustrated in the paper is applied to the watermarked image. This method allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.

4 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132