scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
01 Jan 2015
TL;DR: The main intent of this paper is to study and examine the visual cryptographic shares (i.e.) meaningless or meaningful share for binary and color images.
Abstract: Visual cryptography is used to keep the information secure from unauthorised person by encrypting it. The performance of the visual cryptography is measured in different ways such as pixel expansion, security, contrast, number of secret images, and the type of share generated. The main intent of this paper is to study and examine the visual cryptographic shares (i.e.) meaningless or meaningful share for binary and color images.

1 citations

Journal Article
TL;DR: In this article, a method is proposed for combining steganography and visual cryptography, secret data is embedded using Matrix embedding technique using Hamming codes and shares are generated from this stego image using Random Grids method.
Abstract: Steganography and Visual Cryptography are two areas in which many studies and intensive research have been carried out. Even though the basic idea of both areas in hiding information are similar,steganography and visual cryptography makes use of different methodologies in order to protect their data.In this paper, a method is proposed for combining steganography and visual cryptography. In the proposed method, secret data is embedded using Matrix embedding technique using Hamming codes and shares are generated from this stego image using Random Grids method. The main advantage of Random grids method is there is no pixel expansion; hence embedded secret data can be fully recovered on stacking the shares. This idea of combining steganography and visual cryptography can present a great area for research especially in the world of forensics.

1 citations

01 Jan 2012
TL;DR: This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares and provides secured authentication for the user, using the Biometric authentication.
Abstract: Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. (1) This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. n- secrets equals n/2 levels. This paper also provides secured authentication for the user, using the Biometric authentication (6-7) Thus the proposed paper is implemented in any of the real time applications.

1 citations

Journal Article
TL;DR: This paper proposes a novel approach with the use of random share and key share for encrypting image which employs generating two shares of the original image and can be recovered simply by Xoring the two shares without any loss of image quality.
Abstract: Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. There have various approaches developed for encrypting image. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. But unfortunately there has heavy computation cost and key management and the poor quality of the recovered image from the random shares limit the applications. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.

1 citations

Journal ArticleDOI
Abstract: Majority of the data security ensures scientific systems. What's more related viewpoints on furnish for confidentiality, information security, substance Con-firmation Furthermore information root Confirmation. Visual cryptography may be another system which gives data security utilizing straightforward calculation Dissimilar to the complex, computationally escalated consideration calculations utilized within other systems in customary cryptography. This method permits visual data should make encrypted clinched alongside such an approach that their unscrambling could make performed by those human Visual framework (HVS), without whatever mind boggling cryptographic calculations. Pixel irregular Grids extends those purpose by Moni Naor and Adi Shamir All information in pixel grids will give secrecy and mystery without risking suspicion about an interloper. Those recommended plan complies with the technique for mystery offering plan the place mystery majority of the data is separated under Different greater part done negligible structure Furthermore will be further recouped once covering printed transparencies for the imparted data on it. Each of them will be that point approved for legitimacy. A endeavor need been constructed to utilize hardware rings with implant those mystery data with sure precise revolution. Also acceptance of the single person imparted over order will keep away from deceiving. In this paper we need aid portray each techniques from claiming VCS Also exhibited its similar contemplate utilizing favorable circumstances. What's more Hindrances.

1 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132