scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
26 Jun 2022
TL;DR: In this article , a new simple construction of a visual cryptography scheme with the maximum relative difference for an arbitrarily given strong access structure is presented, which is based on finding the optimal rational-valued solution to a certain linear programming problem which is closely related to the maximization of the relative difference.
Abstract: Visual cryptography schemes are used for secret sharing of digital images. In this paper we develop a new simple construction of a visual cryptography scheme with the maximum relative difference for an arbitrarily given strong access structure. Our construction is based on finding the optimal rational-valued solution to a certain linear programming problem which is closely related to the maximization of the relative difference. Validity of the construction is theoretically proved. Several examples are also given for demonstrating usefulness of our construction.

1 citations

Patent
28 Mar 2012
TL;DR: In this article, a one-time pad password system based on visual cryptography is proposed, which can achieve safe, convenient, and efficient subscriber identity authentication by using a master control program and a database.
Abstract: The invention provides a one-time pad password system based on visual cryptography. The technical scheme is that the one-time pad password system comprises a main-control module, an identity characteristic input interface, a visual information display terminal, a password input terminal and a plurality of subscriber masking pictures, wherein each subscriber masking picture corresponds to a subscriber; the identity characteristic input interface receives the identity characteristic data input of subscribers and sends the identity characteristic data input to the main-control module; the password input terminal receives the password input and sends the password input to the main-control module; the visual information display terminal receives visual cryptography subsidiary pictures sent by the main-control module and displays the visual cryptography subsidiary pictures to the subscribers; the subscribers place the possessed subscriber masking pictures on a first aligning frame to acquire the password P at the time; the main-control module comprises a master control program and a database; the main-control module takes a computer system as the platform and further comprises another master control program and another database to achieve subscriber register and authentication identification. The one-time pad password system provided by the invention can achieve safe, convenient andefficient subscriber identity authentication.

1 citations

Book ChapterDOI
16 Jun 2017
TL;DR: To enhance bike-share service authentication, two novel schemes based on aesthetic QR code combining XOR-based visual cryptography scheme (XVCS) are proposed and the larger region of secret information and the better visual appearance of aesthetic QR Code are shown.
Abstract: To enhance bike-share service authentication, we propose two novel schemes based on aesthetic QR code combining XOR-based visual cryptography scheme (XVCS). In Scheme I, aesthetic QR code based on error correction mechanism and XVCS are combined for authentication. In comparison, Scheme II exploits aesthetic QR code based on XOR mechanism of RS with Positive Basis Vector Matrix (PBVM) and XVCS. The larger region of secret information and the better visual appearance of aesthetic QR code are shown in experiments.

1 citations

Proceedings ArticleDOI
15 Dec 2013
TL;DR: Efficient construction method of (2, 3) RIVCS is introduced without any pixel expansion and increased contrast and the color reversal problem is completely eliminated.
Abstract: Region Incrementing Visual Cryptography (RIVC) was first introduced by R Z Wang in 2009. (2, n) region incrementing visual cryptographic scheme gradually reconstructs the secrets in a single image with multiple security levels. But Wang's scheme suffers from color reversal and pixel expansion. Later, in 2012, k out of n region incrementing scheme and Efficient Construction for Region Incrementing Visual Cryptography using linear programming are also introduced. But all of these have a large pixel expansion problem and some of the methods suffer from colour reversal also. In this paper, efficient construction method of (2, 3) RIVCS is introduced without any pixel expansion and increased contrast. The following are the important features of the proposed system. a) It has no pixel expansion b) Increased contrast c) The color reversal problem is completely eliminated.

1 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132