scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new XOR-based Visual Cryptography Scheme for grayscale or a color secret image that encrypts the secretgrayscale (or color) image into n meaningfulGrayscale shares, which can import n difference cover images and can be completely restored.
Abstract: XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any of the shares, and after applying the logical XOR operation to stack these shares, the original secret image can be recovered. In this paper, we present a new XOR-based VCS for grayscale or a color secret image. This scheme encrypts the secret grayscale (or color) image into n meaningful grayscale (or color) shares, which can import n difference cover images. After stacking n shares using the XOR operation, the original secret image can be completely restored. Both the theoretical proof and experimental results show that our method is accurate and efficient. To the best of our knowledge, ours is the only scheme that currently provides this functionality for grayscale and color secret images.
Book ChapterDOI
05 Oct 2022
TL;DR: In this paper , the authors proposed a technique that uses the concept of (2,2) VC scheme to create shares of a unique key generated during the time of customer account creation.
Abstract: AbstractNowadays with the increase in cybersecurity threats, it has become very important to upgrade the cybersecurity standards for all web applications. Especially in the area of Internet Banking, user authentication is a major issue. An extra layer of security is necessary for user authentication. Two-factor authentication is providing extra layer security in banking services. Biometric-based authentication, password-based authentication, smart card-based authentication are some of the authentication techniques used in banking systems. But all these techniques rely on the security of the database. Another issue faced by the users is regarding the latency in receiving the SMS OTP during online banking. If the network connection is poor, then the user may face latency in receiving OTP. To overcome these issues, we can use the concept of visual cryptography. This paper aims to use the “visual cryptography technique” for the authentication of a user in Internet Banking systems. Visual cryptography was proposed by Naor and Shamir (Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt) in 1994. VC is one of the most secure techniques which can be used for secret sharing, in which the secret information will be in the form of an image. During encryption, we can divide the image into different shares or transparencies and the decryption process can be done by superimposing the shares. There is no need for complex computations in decryption; even by using a normal human visual system, we can decrypt the image; this is one of the advantages of visual cryptography. This paper presents a technique that uses the concept of (2,2) VC scheme to create shares of a unique key generated during the time of customer account creation. One of these shares is given to the customer, and another share will be kept within the server. During the time of two-factor authentication instead of OTP, OTP positions will be generated, and according to that, the server-side share will undergo changes dynamically. And the server-side share will be displayed to the user. The user can superimpose his/her share with the server share to generate the OTP.KeywordsVisual cryptographyOne-time passwordSMS—short message service
01 Jan 2014
TL;DR: In this paper, a secure, reliable, robust and efficient steganography and visual cryptography with view to have no unauthorized access to the encoded with the help of various decoding methods.
Abstract: Our major concern is to have a secured, reliable, robust and the most efficient steganography and visual cryptography with view to have no unauthorized access to the encoded with the help of various decoding methods. The previous extensive research by the expert in this field regarding the existing concern of security of data failed shot to achieve the desire results. On this ground the proposed method is the updated and the advanced version best on Shamir encryption algorithm.
Journal Article
TL;DR: There is a new approach to provide high level security for fund transfer that uses visual cryptography and text based steganography by using AES algorithm and it wills increases user self-assurance and keeps biometric thieving.
Abstract: Non-traditional idea used in days, there is boom of cashless transaction of funds in a market. And major fear for user in online shopping is to provide security to credit or debit card information. Personal identity stealing and phishing are the major issues of online shopping like customer name, password debit or credit card information from victims. There is a techniques used to betray customer. In this paper the idea is to provide to the propose system that uses visual cryptography and text based steganography by using AES algorithm. There is a new approach to provide high level security for fund transfer. And it wills increases user self-assurance and keeps biometric thieving.
Journal ArticleDOI
TL;DR: This paper presents a meta-analyses of the EMMARM, a large-scale probabilistic study of the response of the immune system to chemotherapy and its applications in the context of organ transplantation.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132