scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
01 Nov 2014
TL;DR: In proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography.
Abstract: Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In proposed scheme, user does not need to address the area of different levels manually and levels are created automatically. User needs to use particular level information with a particular size of text. The traditional region incrementing visual cryptography scheme has been modified to address the problem of pixel expansion and poor contrast. In proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography.

1 citations

Patent
01 Jun 2018
TL;DR: In this paper, a security image processing method using visual cryptography based on a time domain and an apparatus thereof is presented, which can enhance the security on a screen shot by continuously providing cryptographed images included in the security image on the time domain.
Abstract: Disclosed are a security image processing method using visual cryptography based on a time domain and an apparatus thereof. The image processing method according to an embodiment of the present invention includes the following steps: receiving an input image; dividing the received input image into a plurality of images using a noise pattern; and generating a security image for the input image based on the time domain for the plurality of divided images. The image processing method further includes the step of continuously providing visually cryptographed images included in the security image on the time domain. Accordingly, the present invention can enhance security on a screen shot.

1 citations

01 Jan 2010
TL;DR: This paper proposes an n out of n uniform secret sharing scheme based on visual cryptography that provides an ecient way to hide a secret information in dierent shares and the size of the shares is just 1 bit more than thesize of the secret, and so it does not vary when the number of participants differs.
Abstract: Secret sharing is concerned with the problem of how to distribute a secret among a group of n participating individuals, or entities, so that only pre-designated collections of individuals are able to recreate the secret by collectively combining their shares of secret. Sharing schemes are useful in military and civilian applications. In the traditional Secret Sharing Schemes, a shared secret information cannot be revealed without any cryptographic computations. Various Secret Sharing Schemes have been proposed. However, the size of the shares and implementation complexity in theses schemes depend on the number of participants. In other words, when a great number of participants are involved, the scheme will become impractical. A secret sharing scheme is called ecient if the total length of the n shares is polynomial in n: In the traditional Visual Secret Sharing Schemes, a shared secret information can be revealed without any cryptographic computations. In this paper we propose an n out of n uniform secret sharing scheme based on visual cryptography. This scheme provides an ecient way to hide a secret information in dierent shares. Further more, the size of the shares is just 1 bit more than the size of the secret, and so it does not vary when the number of participants differs.

1 citations

01 Jan 2014
TL;DR: In order to provide security to the data (2, 2) secret sharing scheme, iris recognition is the most secured scheme.
Abstract: Biometric authentication scheme used for person identification. Biometric authentication scheme consists of uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2) secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques that divide the secret into shares.

1 citations

Proceedings ArticleDOI
01 Dec 2010
TL;DR: A novel extended visual cryptography scheme that has the advantages of resisting geometry distortion, easy recognition and management, and the effectiveness and security of the proposed scheme.
Abstract: In this paper, a novel extended visual cryptography scheme is presented Differ from any existing visual cryptography scheme, the proposed scheme encodes one secret image into one shared image with innocent-looking The secret image is visually revealed by copying the share, shifting the copy and superimposing the shifted copy and the original share together The proposed scheme has the advantages of resisting geometry distortion, easy recognition and management Experimental results demonstrate the effectiveness and security of the proposed scheme

1 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132