scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Posted Content
TL;DR: This paper proposes a general method to increase the amount of secret information that a threshold VCS can encrypt by treating the pseudo-random inputs of the VCS as a subchannel, i.e. the Encrypting More Information Visual Cryptography Scheme (EMIVCS).
Abstract: The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot get any information about the content of the secret image. From the point of view of encrypting (carrying) the secret information, the traditional VCS is not an efficient method. The amount of the information that a VCS encrypts depends on the amount of secret pixels. And because of the restrictions of the human eyes and the pixel expansion and the alignment problem of the VCS, a VCS perhaps can only be used to encrypt a small secret image. VCS requires a random number generator to guide the generation of the shares. As we will show in this paper, the random input of VCS can ba seen as a subchannel which helps carrying more secret information. We propose a general method to increase the amount of secret information that a threshold VCS can encrypt by treating the pseudo-random inputs of the VCS as a subchannel, i.e. the Encrypting More Information Visual Cryptography Scheme (EMIVCS). We also study the bandwidth of the proposed EMIVCS. The disadvantage of the proposed scheme is that, the decoding process is computer aided. However, compared with other computer aided VCS, the proposed scheme is more efficient.

1 citations

Proceedings ArticleDOI
01 Apr 2016
TL;DR: The utilization of visual cryptography is investigated to safeguard the privacy of a picture captcha and some security levels which includes encryption, digital signature and visual cryptography are provided.
Abstract: Cloud storage is getting popular as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this paper we are trying to secure all kind of private data into cloud by providing some security levels which includes encryption, digital signature and visual cryptography. The utilization of visual cryptography is investigated to safeguard the privacy of a picture captcha. This picture captcha is broken down into two shares also known as sheets that are put away in separate database servers one with client and one with application such that the first picture captcha can be uncovered only when both shares are accessible. The individual sheet pictures do not uncover the character of the first picture captcha. When the original picture captcha is uncovered to the client it can be utilized as the secret word. In private auditing scheme for regenerated coded file there exist remote checking method, which include users to stay online, which is not practical. So to endeavor this, third party auditor (TPA) is used to resolve problem of clients for being online all the time.

1 citations

DOI
03 Jul 2015
TL;DR: The system proposes a simple and efficient watermark based on visual cryptography that is robust against watermark attacks and the watermark pattern is very difficult to detect and remove in an illegal way.
Abstract: The system proposes a simple and efficient watermark based on visual cryptography. Visual cryptography deals with visual information (pictures, text, etc.) to be encrypted into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original image. In the proposed method, data is extracted and stored as one share of the watermark pattern instead of embedding data into the original image as in the conventional watermarking schemes. We know that the watermark method is an excellent technique to protect the copyright ownership of a digital image. The watermark pattern can be any black and white image used to typify the owner. Since no data is embedded, the method is robust against watermark attacks and the watermark pattern is very difficult to detect and remove in an illegal way. It can be retrieved from the marked image without making comparison with the original image. The notary also can off-line adjudge the ownership of the suspect image by this method Experimental results show that the method is robust even in the case of maximum frame drop.

1 citations

Proceedings ArticleDOI
01 Apr 2016
TL;DR: A visual cryptography scheme that encodes a set of T >= 2 secrets into two rectangular shares that is efficient and more secure as compare to the existing multiple secret VC scheme, due to the less storage requirement and random pattern generation through cellular automata.
Abstract: Visual Cryptography (VC) is a technique to hide visual information (images, printed text etc.) within images. This technique was introduced by Noar's in Eurocrypt-1994. It is a new type of secret sharing technique. This paper propose a visual cryptography scheme that encodes a set of T >= 2 secrets into two rectangular shares. The T secrets can be reconstructed one by one, by superimposing the second share and the circular shifted first shares with T different circular shift. It requires less storage space compared to different existing VC schemes because only one share store with first row of the secret image taken as password. At the time of decryption, this password will be expanded via cellular automata rule 30 up to stored share size. As result shows recovered secret image may get distorted but still it is efficient and more secure as compare to the existing multiple secret VC scheme, due to the less storage requirement and random pattern generation through cellular automata.

1 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132