scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
09 Jul 2010
TL;DR: The analysis showed that the proposed (n, n) threshold visual cryptography scheme for cheating prevention can avoid cheating and improve the generic transformation for cheating Prevention scheme (GTCP).
Abstract: In this paper, we propose an (n, n) threshold visual cryptography scheme for cheating prevention to improve the generic transformation for cheating prevention scheme (GTCP). We analysis the cheating problem in the GTCP, and present the cheating method applied it to attack on the GTCP. Then we construct the matrices for cheating prevention with following features: (a) each participant can't gain any useful information from his shares, (b) each pixel has the same number of black and white subpixels in the secret share and in the verification share, (c) one's verification image will be recovered by stacking of his verification share and the secret share, (d) the secret image can be revealed by stacking all the secret shares. The analysis showed that our scheme can avoid cheating.

3 citations

Journal Article
TL;DR: A new system that has lower computational requirements and utilizes visual cryptography and text steganography, which will prove important for information security when privacy and security are of paramount importance is proposed.
Abstract: With the rise in internet users, the need for security has increased as well. The first step in securing digital information is through the use of passwords. These text bases passwords are then converted to hash values. However, they are susceptible to attacks like man in the middle attacks and other hacks. Information leaks proves fatal in such scenarios. To combat these issues, we have proposed a new system that has lower computational requirements and utilizes visual cryptography and text steganography. We have also proposed using visual cryptography with utilizes meaningful shares to hide the intent of the images.User’s secret information is used to form an image which is divided and shared over multiples parties.This results in no single party having complete information.The benefit of this is that a hack at any one user won’t compromise user’s information. With the number of online users now in billions,this system has a huge scope and will prove important for information security when privacy and security are of paramount importance.

3 citations

Proceedings ArticleDOI
16 Apr 2014
TL;DR: Simulation results show that the secret binary image can be decoded efficiently and the secret information can be restored by stacking the different shared halftone images together.
Abstract: Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. This paper proposes a schema of information hiding within the method of visual cryptography. The gray image is changed into two halftone images via the different dither matrixes respectively, and the secret binary pixels are encoded into shares. The secret information can be restored by stacking the different shared halftone images together. Simulation results show that the secret binary image can be decoded efficiently.

3 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A natural image based VSS scheme (NVSS scheme) which can without much of a stretch offer secret images by means of various bearer media to secure the secret and the participants at the season of transmission stage in order to defeat the transmission hazard issue.
Abstract: Issue like conceal secret images in shares which might be imprinted on transparencies or are encoded and spared in an advanced structure subsist can be seen in usual visual secret sharing algorithm. Here, shares can either be significant images or noise like pixels, which will bring out suspicion and augment capture attempt risk amid transmission of shares. Along these lines, transmission threat issue for the secret itself and for the participants who are included in the VSS plan endures it as VSS plans have some restriction. In spite of the fact that the new technique been presented i.e a natural image based VSS scheme (NVSS scheme) which can without much of a stretch offer secret images by means of various bearer media to secure the secret and the participants at the season of transmission stage in order to defeat the transmission hazard issue. In this way the new system has been proposed i.e. k-means clustering and watermarking for share generation which will build computation speed and with that there will be normalization and permutation procedure on halftone visual cryptography which will be the substitution of random selection of pixel which are utilized for creating the noise - like share before the shares moves to pixel swapping. The transmission risk issue is diminished to extraordinary degree by unaltered regular shares as they are numerous and innocuous. For explaining the transmission risk issue of VSS plan practical simulation results demonstrate that the proposed methodology is an amazing arrangement.

3 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132