scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2015
TL;DR: An authentication system that combines Biometrics, Visual cryptography and One-Time password (OTP), and a basis matrix construction method for generating shares in visual cryptography technique that is appropriate to be used in applications such as smart card and device authentication systems.
Abstract: In this paper, we use an authentication system that combines Biometrics, Visual cryptography and One-Time password (OTP). We propose a basis matrix construction method for generating shares in visual cryptography technique. Generated shares are in mutually orthogonal groups so that only shares from the same group can reveal the original image. The system provides the user a share of the biometric data and keeps the other share in the server itself. The security of our scheme is based on biometric verification using visual cryptography and hash of a OTP. Therefore, the scheme is appropriate to be used in applications such as smart card and device authentication systems.

4 citations

Journal ArticleDOI
TL;DR: This paper proposes a novel approach with the use of random share and key share, which employs generating two shares of the original image and can be recovered simply by Xoring the two shares without any loss of image quality.
Abstract: To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.

4 citations

Book ChapterDOI
De Li1, Shan Yang1, YiAn Zuo1, ZhiXun Zheng1, LiHua Cui1 
23 Apr 2018
TL;DR: A digital video watermarking scheme based on 2D-DWT and pseudo 3D- DCT transformation, otherwise Singular Value Decomposition are applied in order to enhance the robustness of watermark.
Abstract: Based on Edge Feature Animation zero watermarking algorithm, by making full use of the features and characteristics of the carrier itself, the zero watermarking technology get its own advantages to achieve the best effect of copyright protection. This paper proposes a digital video watermarking scheme based on 2D-DWT and pseudo 3D-DCT transformation, otherwise Singular Value Decomposition are applied. In order to enhance the robustness of watermark, the contour wave transform with good multi-scale and multi-direction analysis is used to transform the original vector. During the embedding process, the Visual cryptography and Chaotic scrambling are used in order to enhance the security of the algorithm. The method selects some key-frames in raw video to extract the luminance components and take them into some groups. The experiments are conducted to verify the robustness for some common signal processing and framework-based attacks.

4 citations

Book ChapterDOI
20 Apr 2018
TL;DR: Experimental results show that HECC offers enhanced security with Perfect Recovery Schemes and limited utilization of additional space compared to existing ECC methods.
Abstract: Various data checks and threats prevails in today’s digital environment, as a result of which one’s details get compromised. Existing data encryption techniques are either vulnerable (RSA 256,512,2 K,4 K bits) or exploit the available resources (ECC-160 bits: the size of the encrypted data is significantly more than the actual evidence). In this paper, we provide a new line of sight on extending the available ECC methods, i.e. Genus-2 Hyper Elliptic Curve Based Light-weight Cryptographic technique. Experimental results show that HECC offers enhanced security with Perfect Recovery Schemes and limited utilization of additional space compared to existing ECC methods.

4 citations

Journal ArticleDOI
TL;DR: This special issue (SI) of the Springer Journal of RealTime Image Processing (JRTIP) entitled Real-Time DH and VCS highlights the latest research results on various image, pattern recognition, and signal processing algorithms and technologies for real-time approaches in DH, RDH, and V CS based on various multimedia.
Abstract: Data hiding (DH) may embed secret data, copyright information, and annotation into various media such as image, audio, video, or text. The embedded data should be invisible to a watchdog, and meanwhile the secret data have to stay hidden in a cover signal without detection from steganalysis tools. For this reason, we should retain the good visual quality of an image with the high embedding data. However, trade-offs exist between the embedding capacity and the degree of quality to cover media modification. That is, as one increases, the other must decrease. Thus, according to our need, we choose the best way to implement DH. Reversible DH (RDH) was derived from DH for sensitive applications such as military and hospital since 10 year ago. Recent research on RDH has been focused on encrypted domains. Another topic of this special issue is visual cryptography scheme (VCS). In the last two decades, investigations on VCS were widely conducted. A basic model of VC was firstly proposed by Naor and Shamir. They demonstrated VCS, where an image was divided into a number of shared images so that only participants in the qualified set could decrypt the secret image, while participants in the nonqualified set have no information about the secret. In VCS, the appealing property is that the decoding process can be performed directly by the human eyes without any complicated cryptographic computation. This ‘‘stackingto-see’’ property of VCS provides many intended applications, e.g., information hiding, access control, watermarking, authentication, identification, and transmitting passwords. This special issue (SI) of the Springer Journal of RealTime Image Processing (JRTIP) entitled Real-Time DH and VCS highlights the latest research results on various image, pattern recognition, and signal processing algorithms and technologies for real-time approaches in DH, RDH, and VCS based on various multimedia. This SI addresses both theoretical and practical problems along with the real-time theme of JRTIP. It includes fast schemes and hardware implementations, as well as software/hardware co-design based on DH/RDH and VCS. The call for papers resulted in 29 submissions. For each submission, at least two reviewers examined its quality, together with the guest editors and editor-in-chief. Finally, 19 papers were accepted for this special issue. The selected papers outlined below can be divided broadly into the following themes. The first theme involves VCS and image secret sharing schemes to support real-time algorithms. Six papers fall into this theme. The second theme involves DH, RDH, and steganography for high capacity and good image quality with fast encoding algorithm, and another nine papers fall into this theme. The third theme has two papers and consists of watermarking and reversible watermarking implemented with FPGA for supporting real-time processing techniques. The fourth theme has two papers including steganalysis and authentication. & C. Kim mipsan@paran.com

4 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132