Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver and has provided better CC, less execution time, higher confidentiality, integrity, and authentication.
Abstract: This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties.
44 citations
••
TL;DR: This paper considers the alignment problem in VCS, and proves that in order to visually recover the original secret image, it is not necessary to align the transparencies precisely.
Abstract: Pixel expansion is an important parameter for Visual Cryptography Schemes (VCS). However, most papers in the literature are dedicated to reduce pixel expansion on the pixel level, i.e. to reduce the number of subpixels that represent a pixel in the original secret image. It is quite insufficient since the final size of the transparencies of the VCS is affected not only by the number of the subpixels, but also by the size of the subpixels in the transparencies. However, reducing the size of the subpixels in the transparencies results in difficulties of alignment of the transparencies. In this paper, we consider the alignment problem in VCS, and prove that in order to visually recover the original secret image, it is not necessary to align the transparencies precisely. This study is restricted to the case when only one transparency is shifted.
44 citations
••
TL;DR: This paper shows a real perfect contrast VCS such that the black and white pixels are perfectly reconstructed within finite runs, no matter what VCS (perfect black or non-perfect black) is used.
Abstract: The Visual cryptography scheme (VCS) is a perfect secure method that encrypts a secret image by breaking it into shadow images. A distinctive property of VCS is that one can visually, without computation, decode the secret by superimposing shadow images. However, much of the contrast of the reconstructed image is lost. A different kind of VCS has been recently proposed by Viet and Kurosawa, called VCS with reversing, allowing participants to perform a reversing operation (reverse black and white) on shadow images. Two drawbacks of the Viet–Kurosawa VCS are: (1) one can only reconstruct an almost ideal contrast image but not an ideal contrast image and (2) the Viet–Kurosawa VCS is constructed just from a perfect black VCS. This paper shows a real perfect contrast VCS such that the black and white pixels are perfectly reconstructed within finite runs, no matter what VCS (perfect black or non-perfect black) is used.
43 citations
••
TL;DR: Experimental results show that the proposed scheme, compared with existing schemes, achieves stronger robustness against several attacks.
Abstract: A digital image copyright protection scheme based on visual cryptography VC and singular value decomposition SVD techniques is proposed. In the proposed scheme, a master share is first constructed by applying SVD to a host image. Then, the master share is used to- gether with a secret image to construct an ownership share, according to a two-out-of-two VC scheme. The secret image for ownership identifica- tion can be revealed by stacking the master share, and the ownership share. The proposed scheme embeds the secret image without modify- ing the host image. In addition, the hidden secret image can be extracted without resorting to the original host image and the aid of computers. Experimental results show that the proposed scheme, compared with existing schemes, achieves stronger robustness against several com- mon attacks. © 2007 Society of Photo-Optical Instrumentation Engineers.
43 citations
••
TL;DR: This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image.
Abstract: Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate.
43 citations