scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article , the design and implementation of a secure payment system based on QR codes is covered, and the proposed solution consists of a mobile application and a payment gateway server that employs visual cryptography.
Abstract: In this paper, the design and implementation of a secure payment system based on QR codes will be covered. In recent years, QR codes have been widely used due to their capacity to speed up payments and provide customers with the highest comfort. Yet, as convenient as QR-based online payment systems may seem, they are vulnerable to a variety of attacks. Transaction processing needs to be adequately secure in order to protect the privacy and accuracy of each payment operation. The online payment system must also guarantee the legitimacy of each transaction for both the sender and the recipient. This article offers security for the proposed QR-based system using visual cryptography. The recommended solution consists of a mobile application and a payment gateway server that employs visual cryptography. Customers who use the application may conduct financial transactions in a secure environment thanks to its clear and user-friendly layout.
Journal ArticleDOI
TL;DR: In this paper , the authors discuss proposed phishing prevention methods and compare different proposed methods and compares different methods of voting system authentication. But, they do not discuss the security of the voting system itself.
Abstract: Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techniques are crucial. Visual Cryptography (VC) is utilized for efficient voting system authentication to cast votes. VC is one of the most secure approaches for privacy protection as it ensures the confidentiality of the voting system. This paper discusses proposed phishing prevention methods and compares different proposed methods.
Journal ArticleDOI
TL;DR: A TTP (Trusted Third Party) watermarking protocol based on visual cryptography for the tripartite transaction model, which can solve the problems reported in the existing literatures and achieves several improvements over other schemes.
Journal ArticleDOI
TL;DR:
Abstract: Secret image sharing (SIS) scheme is a secret image encoding and decoding scheme that reconstructs the secret image only if the number of participants is sufficient. In contrast, inadequate participants gain no information about the secret image. Two-in-one secret image sharing (TiOSIS) scheme is a kind of SIS scheme with two decoding options, quick preview without computation and accurate recovery with computer. For higher decoding speed, Li et al. proposed an improved two-in-one secret image sharing scheme, utilizing Boolean operation for less computational complexity, where the visual quality of the previewed image is deteriorated. In this paper, we use q-bit gray visual cryptography to build a mathematical model for better visual quality of the previewed image based on Li et al.’s TiOSIS scheme. The black sub-pixels of shadows corresponding to a black secret pixel are replaced by a q-bit grayscale value rather than an 8-bit grayscale value where q is a positive integer smaller than 8. The theoretical analysis and experiments are exhibited to guarantee feasibility and effectiveness of the proposed scheme.
Proceedings ArticleDOI
01 Dec 2013
TL;DR: A hierarchical visual cryptographic method which doesn't suffer from any pixel expansion and found similar contrast as the original image and works as a key in this process.
Abstract: Visual cryptography method of secret sharing suffers from pixel expansion and low contrast. Such kind of problem persist in approximately all previous existing visual cryptographic algorithm whereas there are few visual cryptographic method which tries to improve but not done with whole similarity. In this proposed method, we have designed a hierarchical visual cryptographic method which doesn't suffer from any pixel expansion and found similar contrast as the original image. It uses the concept of full binary tree for generating share in (m, m) VCS up to n-1th (started from zero) level of its height where only left child in left sub-tree and right child in right sub-tree are further divided. A small size binary image of factor size of one of leftmost share in left sub-tree is used to generate key by doing XOR operation with this share and resultant share works as a key in this process.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132