scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2016

1 citations

Journal ArticleDOI
TL;DR: A cheating prevention scheme which precludes members of a group from collusive cheating by using additional images for verification by mutually verification in each pair of shared images.
Abstract: Visual cryptography, proposed by Naor and Shamir in 1995, is a scheme which decodes messages by using human visual sensitivity. Cheating has been proved to be possible in visual cryptography. We propose a cheating prevention scheme which precludes members of a group from collusive cheating by using additional images for verification. In each pair of shared images, we detect cheating by mutually verification. The result of verification is clear and directly perceived by the senses. It is a practical technique using authenticating images while the structure of the secret is complex.

1 citations

Proceedings ArticleDOI
01 Dec 2018
TL;DR: An access control system using VCS and Steganography is proposed which separates the system into different privilege levels and can grant different Read/Write permissions to access a specific level to participants based on their roles.
Abstract: Visual Cryptographic Scheme(VCS) is a type of cryptography in which an image is split into shares, and can be decrypted only by superimposing those shares. In this paper, the authors propose an access control system using VCS and Steganography. Authentication Schemes have previously been proposed using VCS. The Authors introduce a model which separates the system into different privilege levels and can grant different Read/Write permissions to access a specific level to participants based on their roles.

1 citations

Journal ArticleDOI
TL;DR: A version of a visual cryptography scheme in which a qualified set of participants is able to block the reconstruction of the secret.
Abstract: We present a version of a visual cryptography scheme in which a qualified set of participants is able to block the reconstruction of the secret.

1 citations

Journal Article
TL;DR: This paper imports the scheme of visual cryptography into Kerberos protocol and constructs a new authentication scheme based on visual cryptography, and the result shows that the new scheme can resist password attack and replay attack.
Abstract: This paper introduces the authentication system of Kerberos protocol, and has a detailed analysis of the Kerberos protocol securityOn this condition, it imports the scheme of visual cryptography into Kerberos protocol and constructs a new authentication scheme based on visual cryptographyIt analyses the safety of Kerberos protocol, and the result shows that the new scheme can resist password attack and replay attack

1 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132