Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article , the design and implementation of a secure payment system based on QR codes is covered, and the proposed solution consists of a mobile application and a payment gateway server that employs visual cryptography.
Abstract: In this paper, the design and implementation of a secure payment system based on QR codes will be covered. In recent years, QR codes have been widely used due to their capacity to speed up payments and provide customers with the highest comfort. Yet, as convenient as QR-based online payment systems may seem, they are vulnerable to a variety of attacks. Transaction processing needs to be adequately secure in order to protect the privacy and accuracy of each payment operation. The online payment system must also guarantee the legitimacy of each transaction for both the sender and the recipient. This article offers security for the proposed QR-based system using visual cryptography. The recommended solution consists of a mobile application and a payment gateway server that employs visual cryptography. Customers who use the application may conduct financial transactions in a secure environment thanks to its clear and user-friendly layout.
••
TL;DR: In this paper , the authors discuss proposed phishing prevention methods and compare different proposed methods and compares different methods of voting system authentication. But, they do not discuss the security of the voting system itself.
Abstract: Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techniques are crucial. Visual Cryptography (VC) is utilized for efficient voting system authentication to cast votes. VC is one of the most secure approaches for privacy protection as it ensures the confidentiality of the voting system. This paper discusses proposed phishing prevention methods and compares different proposed methods.
••
TL;DR: A TTP (Trusted Third Party) watermarking protocol based on visual cryptography for the tripartite transaction model, which can solve the problems reported in the existing literatures and achieves several improvements over other schemes.
••
TL;DR:
Abstract: Secret image sharing (SIS) scheme is a secret image encoding and decoding scheme that reconstructs the secret image only if the number of participants is sufficient. In contrast, inadequate participants gain no information about the secret image. Two-in-one secret image sharing (TiOSIS) scheme is a kind of SIS scheme with two decoding options, quick preview without computation and accurate recovery with computer. For higher decoding speed, Li et al. proposed an improved two-in-one secret image sharing scheme, utilizing Boolean operation for less computational complexity, where the visual quality of the previewed image is deteriorated. In this paper, we use q-bit gray visual cryptography to build a mathematical model for better visual quality of the previewed image based on Li et al.’s TiOSIS scheme. The black sub-pixels of shadows corresponding to a black secret pixel are replaced by a q-bit grayscale value rather than an 8-bit grayscale value where q is a positive integer smaller than 8. The theoretical analysis and experiments are exhibited to guarantee feasibility and effectiveness of the proposed scheme.
••
01 Dec 2013TL;DR: A hierarchical visual cryptographic method which doesn't suffer from any pixel expansion and found similar contrast as the original image and works as a key in this process.
Abstract: Visual cryptography method of secret sharing suffers from pixel expansion and low contrast. Such kind of problem persist in approximately all previous existing visual cryptographic algorithm whereas there are few visual cryptographic method which tries to improve but not done with whole similarity. In this proposed method, we have designed a hierarchical visual cryptographic method which doesn't suffer from any pixel expansion and found similar contrast as the original image. It uses the concept of full binary tree for generating share in (m, m) VCS up to n-1th (started from zero) level of its height where only left child in left sub-tree and right child in right sub-tree are further divided. A small size binary image of factor size of one of leftmost share in left sub-tree is used to generate key by doing XOR operation with this share and resultant share works as a key in this process.