scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
01 Jul 2011
TL;DR: A new (t, n) threshold visual secret sharing scheme which is suitable for grayscale images and for color images that ensures the reliability of verification procedures compared with existing verifiable secret sharing schemes and can reconstruct the secret image exactly.
Abstract: In this paper, we propose a new (t, n) threshold visual secret sharing scheme which is suitable for grayscale images and for color images. The proposed scheme achieves the following objectives. First, it satisfies the four general criteria of visual secret sharing systems: security, accuracy, shadow size and computation cost. Second, it ensures the reliability of verification procedures compared with existing verifiable secret sharing schemes. Moreover, the scheme can reconstruct the secret image exactly. Finally, the computational complexity of our proposed scheme is much less than required with other previous schemes. Therefore, our proposed scheme is suitable for real-time applications.

3 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed blind watermarking scheme is robust against various image-processing operations, geometric attacks and JPEG compression.
Abstract: In this paper, a blind watermarking scheme based on Visual Cryptography (VC) is proposed. A sub-image is extracted from the host image and master share is generated by combining the luminance features and edge features of this sub-image. Ownership share is constructed by using a binary secret image together with the master share. When the owner needs to be identified, we can stack these two shares to recover the secret image to validate the ownership. Experimental results demonstrate that the proposed scheme is robust against various image-processing operations, geometric attacks and JPEG compression.

3 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This scheme uses the new pixel patterns to enhance the contrast of the decrypted image and reduces the noise in the recreated image without any additional computation.
Abstract: Security and contrast are the two key parameters in visual cryptography schemes. Security condition is fulfilled if each share reveals no information of the secret image and the secret image cannot be obtained if there are k-1 shares together. The security and reliability of the visual cryptography scheme can be greatly enhanced with recursion. The contrast of the reconstructed secret image is less compared to the existing visual cryptography schemes. The proposed model provides improved contrast and reduces the noise in the recreated image without any additional computation. This scheme uses the new pixel patterns to enhance the contrast of the decrypted image. The contrast of the recursive visual cryptography scheme can be enhanced based on new pixel patterns for white pixels.

3 citations

01 Jan 2012
TL;DR: The concept of visual information pixel (VIP) synchronization and error diffusion is introduced to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.
Abstract: Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. Cryptography is the study of mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. This project introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method. Index Terms—Color meaningful shares, digital halftoning, error diffusion, secret sharing, visual cryptography (VC).

3 citations

Journal ArticleDOI
TL;DR: In this article , the capacity of sharing multiple secrets in XOR-based VCS (XVCS) was exploited and three efficient base matrix constructions were proposed for realizing the XVCS.
Abstract: Multiple-secret visual cryptography scheme (MVCS) and fully incrementing visual cryptography scheme (FIVCS) have the same functionality that different secrets are gradually revealed by stacking different numbers of shadows. In essence, MVCS and FIVCS are the same. However, both of the two schemes suffer from large pixel expansion and deteriorated reconstructed image quality. In addition, MVCS and FIVCS require intensive computations to create base matrices. In this research, we exploit the capacity of sharing multiple secrets in XOR-based VCS (XVCS). First of all, three efficient base matrix constructions are proposed for realizing the $(k, n)$ non-monotonic XVCS (NXVCS), where the secret image is only revealed by XOR-ing exact $k$ shadows. The $(k, n)$ -NXVCS is adopted to constitute the multiple-secret XVCS (MXVCS). Theoretical analysis on the proposed constructions is provided. Extensive experiments and comparisons are conducted to illustrate that the pixel expansion, the visual quality of recovered image and the efficiency of generating base matrices are significantly improved by the proposed MXVCS, while comparing to MVCS and FIVCS.

3 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132