scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This research work can give a way for providing authentication to all services which are related to electronic devices by providing secure data communication with less computational complexity.
Abstract: Background: Now a day, data communication plays a vital role in day-to-day life There is a strong desire to develop and implement more secure authentication protocol to protect secret information against security threats Method: The paper proposes a Quick Response (QR) code Authentication Protocol (QRAP) using Visual Cryptography Visual Cryptography (VC) is a model of cryptography split the secret into share images, which prevents the secret image from being altered by using the concepts of the cipher and can reconstruct the secret image by stacking the legitimate share images Findings: The passwords for authentication are encoded as QR-codes and later encrypted into colour share images Thus, the colour share images by itself convey no information, but when the shares are combined, the secret password can be revealed The necessary is that the user needs to handle a device containing a QR-code reader, most probably a Smartphone The experimental result shows that the proposed QRAP scheme provides secure data communication with less computational complexity Applications/Improvement: This research work can give a way for providing authentication to all services which are related to electronic devices

3 citations

Proceedings ArticleDOI
12 Nov 2012
TL;DR: A watermarking algorithm for colour image, concept of visual cryptography extended to digital water marking based on VSS algorithm which can satisfy the transparency and robustness of the watermarked system very well.
Abstract: In this paper, we propose a watermarking algorithm for colour image, concept of visual cryptography extended to digital watermarking based on VSS algorithm. An image which has to be transmitted (watermark) is split into two sheet-images using visual secret sharing algorithm. Then, one sheet-image are embedded into the host image blue component before transmission and second sheet-image is held by the owner At the receiving end, user extracts the sheet-images from the watermarked image and stacks the two sheet-images directly without any leakage of information about the original image. The algorithm can satisfy the transparency and robustness of the watermarking system very well. Sheet-image are embedded into the host image green, blue and red component one by one and compared. The results showed that mostly blue component gives better result.

3 citations

Journal ArticleDOI
TL;DR: Li et al. as mentioned in this paper presented a trusted VCS (trusted VCS) which consists of two main components: a high-quality VCS and an enhanced verification scheme of shares based on the emerging Intel Software Guard eXtensions (SGX).
Abstract: Visual cryptography scheme (VCS) is a secret-sharing scheme which encrypts images as shares and can decrypt shares without digital devices. Although a participant can reveal the secret image by merely stacking a sufficient number of shares, the visual quality of recovered images is reduced, and malicious adversaries can cheat participants by giving faked shares. The paper presents a novel VCS called T-VCS (trusted VCS) which consists of two main components: a high-quality VCS and an enhanced verification scheme of shares based on the emerging Intel Software Guard eXtensions (SGX). While providing high-quality recovery, T-VCS keeps the size of the shares the same as the original secret image. We use SGX to act as a trusted third party (TTP) to verify the validity of the shares in an attested enclave without degrading the image quality. The experimental results show that T-VCS can achieve a balance among contrast, share size, and verification efficiency.

3 citations

Proceedings ArticleDOI
01 Sep 2016
TL;DR: A novel methodology is introduced by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography to address the need for safe and secure transactions.
Abstract: With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need automatically translates to the requirement of increased network security and better and fast encryption algorithms. This paper addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. The complete algorithm was designed and developed using the MATLAB 2011b software. The paper also discusses a hardware approach for deploying the algorithm and elaborates on an area, speed and power efficient design on a Spartan 3E Xilinx FPGA platform.

3 citations

Journal Article
TL;DR: A method for processing halftone images that improves the quality of the recovered images and also avoids pixel expansion is proposed and the resulting scheme maintains the perfect security of the original extended visual cryptography approach and also provides a better result.
Abstract: Visual cryptography is a secret sharing scheme that divides secret images into shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, an extra security is provided by giving cover images to the shares. However, in either case, loss of resolution, contrast, and image size expansion are challenging problems that the researchers are facing. In this paper, we propose a method for processing halftone images that improves the quality of the recovered images and also avoids pixel expansion. The resulting scheme maintains the perfect security of the original extended visual cryptography approach and also provides a better result.

3 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132