scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In order to achieve higher level of security, both image steganography and visual cryptography are required and Neural networks are used to identify the best locations in cover image to embed the secret data, improving quality of the image.
Abstract: As a result of widespread use of communication medium over the internet, information security has become the area of concern. In the field of internet, the main issue is the data security. Image steganography is concerned with sending secret message while hiding its existence itself. Cryptography is not concerned with hiding the existence of a message, but it means a process called encryption. In order to achieve a better level of secrecy, a message is encrypted before being hidden in a message. Hence, after applying encryption, image steganography embeds the secret message in a cover, such as a digital image file. Steganalysis deals with the whole field of defeating steganographic techniques. Steganography is a constantly evolving field as advances in steganography are usually countered by advances in steganalysis. Thus image steganography alone is not sufficient for providing data security. Visual cryptography is a popular technique to protect image based data. It splits the image into shares during encryption process and these shares are stacked to get back the original image during decryption. So, no special decryption algorithm is needed, just human visual system would suffice. Hence in order to achieve higher level of security, both image steganography and visual cryptography are required. Neural networks are used to identify the best locations in cover image to embed the secret data, improving quality of the image.
Proceedings ArticleDOI
01 Aug 2018
TL;DR: An improved color image security algorithm is proposed which encrypt and decrypt the color image using the decomposition of RGB components (sieving), Pixel shuffling, RC4 cipher algorithm, image division and combining using visual cryptography to result in shares of image.
Abstract: Internet is become the most used medium for communication of information like text, images, videos etc. The information exchanged on internet is through unsecured network, maintaining security of the information is the most important issue. To secure information from unauthorized users, there is need to convert the information into an unrecognizable format. Visual cryptography is the best known techniques which encrypts an image into n number of shares and decrypt the image with the human visual system without any additional mathematical computations.This paper proposes an improved color image security algorithm. The algorithm encrypt and decrypt the color image using the decomposition of RGB components (sieving), Pixel shuffling, RC4 cipher algorithm, image division and combining using visual cryptography to result in shares of image. The generated encrypted shares are further shared over the network.
Book ChapterDOI
01 Jan 2018
TL;DR: This paper breaks down various VC security instruments for computerized picture information offering to regard to mystery information secrecy and gives effective security answers for relative mystery advanced picture information imparting to correspondence progressively environment.
Abstract: Due to expanding computerized world continuously environment, security has gotten to be creative assignment in transmitting picture. There are more number of methods presented for security in advanced pictures for insurance from inventive uninvolved or dynamic assaults in system correspondence environment. Like insightful Visual Cryptographic (VC) is a cutting edge strategy, which is utilized to mystery picture safely impart furthermore keep up to privacy. To proceed with difficulties of security in advanced picture information sharing, in this paper we break down various VC security instruments for computerized picture information offering to regard to mystery information secrecy. Our examination give effective security answers for relative mystery advanced picture information imparting to correspondence progressively environment.
Journal ArticleDOI
TL;DR: Some national post offices offer postage stamps showing an image chosen by the customer, but in at least one case, an image was refused for political reasons and Visual cryptography was used to get the post office to produce two stamps showing images which are closely related to the rejected image.
Abstract: Some national post offices offer postage stamps showing an image chosen by the customer, but in at least one case, an image was refused for political reasons. Visual cryptography was used to get the post office to produce two stamps showing images which are closely related to the rejected image. They look like random graphic designs, but the original image appears when the two graphic designs are held one on top of the other and lit from the back.
01 Jan 2015
TL;DR: Wang et al. as discussed by the authors proposed to hide a private face image in two host face images and successful matching of face images reconstructed from the sheets, which can be used to provide additional security to the digital image.
Abstract: Preserving the privacy of pictures keeps exploitation face de identification and face swapping is unreliable since these techniques reduced the chance of automatic face recognition, so the first image is lost. So as to supply additional security to the digital image, visual cryptography is planned. during this case, personal face image is dithered into two host face pictures that square measure keep in two different online servers specified the private image is discovered only each sheets square measure at the same time accessible. At a similar time, the individual sheet pictures don't reveal the identity of the non-public image.  The possibility of hiding a private face image in two host face images and successful matching of face images reconstructed from the sheets.  The inability of sheets to reveal the identity of the private face image.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132