scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
27 Mar 2021
TL;DR: In this article, the authors describe the design and implementation of a secure payment system based on QR codes, which consists of a mobile application and a payment gateway server that implements visual cryptography.
Abstract: In this paper, we will describe the design and implementation of a secure payment system based on QR codes. These QR codes have been extensively used in recent years since they speed up the payment process and provide users with ultimate convenience. However, as convenient as they may sound, QR-based online payment systems are vulnerable to different types of attacks. Therefore, transaction processing needs to be secure enough to protect the integrity and confidentiality of every payment process. Moreover, the online payment system must provide authenticity for both the sender and receiver of each transaction. In this paper, the security of the proposed QR-based system is provided using visual cryptography. The proposed system consists of a mobile application and a payment gateway server that implements visual cryptography. The application provides a simple and user-friendly interface for users to carry out payment transactions in user-friendly secure environment.

2 citations

Proceedings ArticleDOI
28 Sep 2015
TL;DR: Visual Cryptography, as one among this, is a methodology where the secret recovery is done with human visual system without having to perform complex calculations.
Abstract: Secrecy, Integrity and Authenticity are the major trust areas whenever information is subjected to third party intervention who can gain data access from vulnerable links in the system, communication channel or individual user identity. While addressing these issues, Cryptography turns out to be the trusted brand in the computer science fraternity and Visual Cryptography, as one among this, is a methodology where the secret recovery is done with human visual system without having to perform complex calculations. The proposed scheme complies with the methodology of secret sharing scheme where secret information is divided into various shares in meaningless form and is further recovered on overlapping printed transparencies with the shared information on it. Each of them is then validated for authenticity. An attempt has been made to use circular rings to embed the secret information with certain angular rotation and validation of the individual cipher shared in order to avoid cheating.

2 citations

Journal Article
TL;DR: A new scheme is introduced to encode a secret image into single shadow image called visual hiding in the paper, where decode uses the shadow image stack itself and shows the original image in certain orientation.
Abstract: A new scheme is introduced to encode a secret image into single shadow image called visual hiding in the paper, where decode uses the shadow image stack itself and shows the original image in certain orientation. The shadow image acts both encoder and decoder function, which can visually recover the original image without any knowledge of cryptography and without performing of any cryptographic computation. The definition of visual hiding image, general construction and threshold scheme are to given in this paper. The correctness and uniqueness of recovering the original image using visual matrix is to be approved in this paper. The visual hiding has the property of anti compression and anti distortion, while visual cryptography has not. The scheme of visual hiding has various models and random characteristics, while visual cryptography has not.

2 citations

Book ChapterDOI
01 Jan 2014
TL;DR: This chapter introduces the various applications of visual cryptography and hopes the simple and effective encryption and decryption techniques of visual cryptographic techniques could be applied to the authors' ordinary life.
Abstract: Based on the theoretic research we conducted, in this chapter, we introduce the various applications of visual cryptography. The typical applications of visual cryptography include watermarking, resolution variant visual cryptography, multiple resolution visual cryptography scheme, etc. We hope the simple and effective encryption and decryption techniques of visual cryptography could be applied to our ordinary life.

2 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132