scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
01 Nov 2016
TL;DR: The proposed hybrid algorithm provides better imperceptibility in harmony with the human visual system and offers higher robustness against signal processing attacks.
Abstract: In this paper, we propose a new hybrid blind algorithm for the copyright protection of colour images. The novelty in the presented approach consists in designing a hybrid visual cryptography cum discrete wavelet transform based digital colour image watermarking. The distortion caused by new algorithm is assessed by using peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) and robustness against different types of attacks have been assessed using StirMark. The proposed hybrid algorithm provides better imperceptibility in harmony with the human visual system and offers higher robustness against signal processing attacks.

2 citations

Book ChapterDOI
01 Jan 2014
TL;DR: A robust watermarking worked for multiple images and multiple users, using polynomial-based image secret sharing, DWT transform, and chaos technique to verify copyright easier.
Abstract: In this paper, we proposed a robust watermarking worked for multiple images and multiple users. This scheme adopted polynomial-based image secret sharing, DWT transform, and chaos technique. Secret sharing scheme provides better efficient on protecting copyright with multiple users, specifically in some situation, we are not easy to recover watermark by all participants. In order to verify copyright easier, we use polynomial-based image secret sharing scheme to reach a supervised verification. Any two users whose owns capability can recover the watermark with the trust authority. The experimental result shows that this scheme is efficient and robust.

2 citations

Proceedings ArticleDOI
06 Dec 2011
TL;DR: The experimental results and security analysis state that the proposed visual cryptographic technique leads to active levels of image security and quality without pixel expansion.
Abstract: Visual cryptography is a powerful approach for image sharing security through unsecured network such as Internet. Pixel expansion and bad image quality are the most cons of this approach. Therefore, visual cryptographic technique is proposed for grayscale images to overcome these drawbacks by Fast Fourier Transform (FFT). FFT is used for image sharing where each share is encrypted via Multilayer Security Method (MSM). Image compression is also basically used to eliminate the pixel expansion which is produced before the encryption process. The experimental results and security analysis state that the proposed visual cryptographic technique leads to active levels of image security and quality without pixel expansion.

2 citations

Proceedings ArticleDOI
27 Aug 2014
TL;DR: The two PVSS schemes are equal in terms of their ideas, security and visual quality, and it is shown that the two means are equalIn this paper, the two causes of progressive visual secret sharing are shown.
Abstract: Apart from traditional visual secret sharing (VSS), progressive visual secret sharing (PVSS) can gain clearer recovered secret image with more shares. In the literature, Hou and Quan [Hou, Y. C., Quan, Z. Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), Pages 1760-1764(2011)], and Chen et al. [Chen, T.-H., et al., Quality-adaptive visual secret sharing by random grids. J. Syst. Software, Volume 86, Issue 5, May 2013, Pages 1267-1274(2013)] proposed two PVSS schemes, respectively, that solved the pixel expansion and poor visual quality problems of previous PVSS. In this paper, we show that the two means are equal in terms of their ideas, security and visual quality.

2 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132