scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal Article
TL;DR: To overcome the problem of authentication with the two topics based on image processing i.e. steganography and visual cryptography, the question is how to handle the application that requires a high level of security, such as core banking and net banking.
Abstract: The bank may provide two sets of services namely core banking and net banking. In a core banking system, there is a chance of encountering forged signature for transaction, and in net banking system, the password of the customer may be hacked and misused. With the advent of internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Today, most applications are only as secure as their underlying system. Since the design and technology of middleware has improved steadily, their detection is a difficult problem. A computer that is connected to the Internet can be considered trustworthy secure or not. The question is how to handle the application that requires a high level of security, such as core banking and net banking. In core banking and net banking the major problem is the authenticity of the customer due to unavoidable hacking of the databases on the internet. To overcome this problem of authentication we are discussing with the two topics based on image processing i.e. steganography and visual cryptography. Key terms – phishing, core banking, net banking, steganography, visual cryptography.

2 citations

Journal ArticleDOI
TL;DR: This paper has summarized the various schemes for schemes for segment based visual cryptography and analyzed majorly three techniques :1> Secret sharing, 2> symmetric key distribution 3> Seeded Region growing based segmentation.
Abstract: Segmentation based visual cryptography is segment based not pixel based and works on symbols that may be shown as segment display, the two major technique proposed in this category are seven segment and sixteen display. The major benefit of using Segment Based encryption is that “It is easy to adjust the secret images and potentially easy to recognize for the human eye”. In this paper we have summarised the various schemes for schemes for segment based visual cryptography given in figure 4 .We have analyzed majorly three techniques :1> Secret sharing, 2> symmetric key distribution 3> Seeded Region growing based segmentation. Future researchers may focus on automated seeding algorithms.

2 citations

Journal ArticleDOI
TL;DR: This paper presents multiple secrets sharing scheme called region splitting visual cryptography (RSVC) using random grids, which has following features: universal share for all secret messages, any number of shares cannot reveal any information of universal share and secret messages.
Abstract: Visual cryptography is encryption technique to hide secret image into noise–like images, called as shares. Shares are stacked together to decrypt secret image. This paper presents multiple secrets sharing scheme called region splitting visual cryptography (RSVC) using random grids. To share n secrets, n shares are utilized along with common universal share. Proposed method has following features:(1) universal share for all secret messages, (2) any number of shares cannot reveal any information of universal share and secret messages, (3) no pixel expansion of shares, (4) no codebook requirement, and (5) human visual system is employed to decrypt the secret messages where no computational device or cryptographic knowledge is required.

2 citations

Book ChapterDOI
23 Jan 2020
TL;DR: Proposed system focuses on data security by hiding it behind the video as a carrier and then transmitting it over an unsecured wireless media to have a better outcome than any other existing technique with the primary motto of hiding data at any e bit position of carrier object.
Abstract: Information remains as the primary source in any industry. Every industry spends most of its expenditure on the security of data either stored on a local server or on the cloud. Lots of existing techniques are available to protect data from unauthorized access. Existing techniques like cryptography, steganography, and watermarking are used to protect data with some limitations. Proposed system focuses on data security by hiding it behind the video as a carrier and then transmitting it over an unsecured wireless media. It is expected to have a better outcome than any other existing technique with the primary motto of hiding data at any e bit position of carrier object.

2 citations

Journal ArticleDOI
31 Jul 2021
TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Abstract: The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in online voting schemes, and these are examined in this work. The emerging cryptographic techniques which are suitable for secure online voting systems are analyzed. Techniques like password hashed-based schemes, visual cryptography, and threshold decryption cryptosystem are highlighted for secure online voting systems. Visual cryptography (VC) is a technique where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process to achieve high accuracy while being scam-free. The proposed secure online voting system using visual cryptography is efficiently developed using Python and achieves better performance on minimum software and hardware configuration systems.

2 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132