scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2018
TL;DR: This paper proposes a system that creates an image-based cypher on printed documents and interprets image cyphers for users and shows that the proposed system satisfies important requirements such as security, usability, and performance.
Abstract: Sensitive information in printed documents are susceptible to security risks. This paper proposes a system that creates an image-based cypher on printed documents and interprets image cyphers for users. Our evaluation results show that the proposed system satisfies important requirements such as security, usability, and performance.
Journal ArticleDOI
16 Mar 2017
TL;DR: A novel authentication technique using bit plane-based encryption for fraud candidate detection during any stage of the selection process using multiple identity proofs to authenticate the candidate.
Abstract: In today's competitive world, examinations are a means of assessing a person's potential. It is therefore important that such process be unbiased, but several cases have been encountered where candidates use proxies to write exams and score well. To deal with the same, generally we use multiple identity proofs to authenticate the candidate, which increases the privacy concern and expended on maintaining the extra data and keeping it secure. This paper introduces a novel authentication technique using bit plane-based encryption for fraud candidate detection during any stage of the selection process. Multiple visual cryptography-based method has been explored for its suitability. The effect of noise and differently chosen encryption scheme has also been observed. With the currently available infrastructure, it is quite easy to implement the proposed system for authentication of students and provide a level platform for competition.
01 Jan 2014
TL;DR: The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image, which is revealed without any complex computation.
Abstract: Visual cryptography is a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as Visual Cryptography Scheme (VCS). In this paper secret image is divided into shares (printed on transparencies), and each share holds some information. At the receiver, this shares are merged to obtain the secret information which is revealed without any complex computation. The proposed algorithm is for color host image, divided into three color planes Red, Green, Blue and merged with secret image which is binarized and divided into shares. The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image.
Proceedings ArticleDOI
01 Dec 2018
TL;DR: The results clearly indicate that the proposed scheme can send more data with less bandwidth more secretly.
Abstract: Security has gained a lot of importance with the rapid development of communication/storage technology. Protecting the data has become an important issue. In this paper a transmission system with enhanced security is proposed for the image information. Here, the secret image is encrypted and transmitted by using a combined technique that make use of Discrete Wavelet Transform (DWT), Visual Cryptography (VC) and Water marking. DWT is first used for the compression of the secret image. Visual cryptography encodes the compressed image into noise like shadow images known as shares. Shares are made invisible by digital watermarking, which provides additional security. By stacking the shares together, the secret image can be visually decoded. Different image types are used to evaluate the performance of the proposed scheme. Comparison with different values of scaling parameter M, which is used to decrease the size of image in the VC is also done. The results clearly indicate that the proposed scheme can send more data with less bandwidth more secretly.
Book ChapterDOI
01 Jan 2015
TL;DR: The proposed scheme enhances the security of banking locker system by distributing the secret between customer and bank employee and reduces the space complexity of database.
Abstract: Now a day’s security plays key role in every manner. As every system is becoming automated security is must. In today’s worldwide computer network environment exact and secure data transmission is very much essential. In this paper, a new approach is proposed to improve the security of banking locker system. This system will enhance the security of automated banking locker system using visual cryptography. Visual Cryptography (VC) is a secret sharing scheme where a secret image is encrypted into the number of shares which independently unable to disclose information about the original secret image. The proposed system uses random grids based VC. The advantage of this scheme is no pixel expansion in reconstructed image and no need of a codebook. The proposed scheme enhances the security of banking locker system by distributing the secret between customer and bank employee and reduces the space complexity of database.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132